Update supported browsers for multiple modules
Pretty Theft module does not work in IE Multiple exploit modules haven't been tested
This commit is contained in:
@@ -21,5 +21,3 @@ beef:
|
|||||||
name: "Axous <= 1.1.1 Add User CSRF"
|
name: "Axous <= 1.1.1 Add User CSRF"
|
||||||
description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)."
|
description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)."
|
||||||
authors: ["bcoles", "Ivano Binetti"]
|
authors: ["bcoles", "Ivano Binetti"]
|
||||||
target:
|
|
||||||
working: ["ALL"]
|
|
||||||
|
|||||||
@@ -21,5 +21,3 @@ beef:
|
|||||||
name: "boastMachine <= 3.1 Add User CSRF"
|
name: "boastMachine <= 3.1 Add User CSRF"
|
||||||
description: "Attempts to add a user to a boastMachine <= 3.1 install."
|
description: "Attempts to add a user to a boastMachine <= 3.1 install."
|
||||||
authors: ["bcoles", "Dr.NaNo"]
|
authors: ["bcoles", "Dr.NaNo"]
|
||||||
target:
|
|
||||||
working: ["ALL"]
|
|
||||||
|
|||||||
@@ -21,5 +21,3 @@ beef:
|
|||||||
name: "Spring Framework Malicious Jar Exploit"
|
name: "Spring Framework Malicious Jar Exploit"
|
||||||
description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).<br/>Specify the URL for a form controller on the target and the URL for your malicious JAR file.<br/>For more information see: http://www.exploit-db.com/exploits/13918/<br/><br/>Versions Affected:<br/>3.0.0 to 3.0.2<br/>2.5.0 to 2.5.6.SEC01 (community releases)<br/>2.5.0 to 2.5.7 (subscription customers)"
|
description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).<br/>Specify the URL for a form controller on the target and the URL for your malicious JAR file.<br/>For more information see: http://www.exploit-db.com/exploits/13918/<br/><br/>Versions Affected:<br/>3.0.0 to 3.0.2<br/>2.5.0 to 2.5.6.SEC01 (community releases)<br/>2.5.0 to 2.5.7 (subscription customers)"
|
||||||
authors: ["bcoles"]
|
authors: ["bcoles"]
|
||||||
target:
|
|
||||||
working: ["ALL"]
|
|
||||||
|
|||||||
@@ -21,5 +21,3 @@ beef:
|
|||||||
name: "AlienVault OSSIM 3.1 XSS"
|
name: "AlienVault OSSIM 3.1 XSS"
|
||||||
description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/20062/"
|
description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/20062/"
|
||||||
authors: ["bcoles", "muts"]
|
authors: ["bcoles", "muts"]
|
||||||
target:
|
|
||||||
working: ["ALL"]
|
|
||||||
|
|||||||
@@ -21,5 +21,3 @@ beef:
|
|||||||
name: "Cisco Collaboration Server 5 XSS"
|
name: "Cisco Collaboration Server 5 XSS"
|
||||||
description: "Attempts to hook Cisco Collaboration Server 5 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/11403/"
|
description: "Attempts to hook Cisco Collaboration Server 5 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/11403/"
|
||||||
authors: ["bcoles", "s4squatch"]
|
authors: ["bcoles", "s4squatch"]
|
||||||
target:
|
|
||||||
working: ["ALL"]
|
|
||||||
|
|||||||
@@ -21,5 +21,3 @@ beef:
|
|||||||
name: "Serendipity <= 1.6 XSS"
|
name: "Serendipity <= 1.6 XSS"
|
||||||
description: "Attempts to hook Serendipity <= 1.6 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/18884/"
|
description: "Attempts to hook Serendipity <= 1.6 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/18884/"
|
||||||
authors: ["bcoles", "Stefan Schurtz"]
|
authors: ["bcoles", "Stefan Schurtz"]
|
||||||
target:
|
|
||||||
working: ["ALL"]
|
|
||||||
|
|||||||
@@ -23,3 +23,4 @@ beef:
|
|||||||
authors: ["pwndizzle", "vt [nick.freeman@security-assessment.com]", "xntrik"]
|
authors: ["pwndizzle", "vt [nick.freeman@security-assessment.com]", "xntrik"]
|
||||||
target:
|
target:
|
||||||
user_notify: ['ALL']
|
user_notify: ['ALL']
|
||||||
|
not_working: ['IE']
|
||||||
|
|||||||
Reference in New Issue
Block a user