diff --git a/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml b/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml
index f1e802a65..c01ca6f49 100644
--- a/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml
+++ b/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml
@@ -21,3 +21,5 @@ beef:
name: "Axous <= 1.1.1 Add User CSRF"
description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)."
authors: ["bcoles", "Ivano Binetti"]
+ target:
+ unknown: ["ALL"]
diff --git a/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml b/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml
index 6c703c02f..f16e2ece6 100644
--- a/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml
+++ b/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml
@@ -21,3 +21,5 @@ beef:
name: "boastMachine <= 3.1 Add User CSRF"
description: "Attempts to add a user to a boastMachine <= 3.1 install."
authors: ["bcoles", "Dr.NaNo"]
+ target:
+ unknown: ["ALL"]
diff --git a/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml b/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml
index 012b7f74f..6232339f5 100644
--- a/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml
+++ b/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml
@@ -22,7 +22,7 @@ beef:
enable: true
category: ["Exploits", "NAS"]
name: "FreeNAS Reverse Root Shell CSRF"
- description: "Attempts to get a reverse root shell on a FreeNAS server.
Tested on version 8.2.0 however other versions are likely to be vulnerable."
+ description: "Attempts to get a reverse root shell on a FreeNAS server.
Tested on version 8.2.0 however other versions are likely to be vulnerable.
Patched in version 8.3.0-BETA3."
authors: ["bcoles"]
target:
working: ["ALL"]
diff --git a/modules/exploits/spring_framework_malicious_jar/config.yaml b/modules/exploits/spring_framework_malicious_jar/config.yaml
index 7d5a17bc4..b898a24f2 100644
--- a/modules/exploits/spring_framework_malicious_jar/config.yaml
+++ b/modules/exploits/spring_framework_malicious_jar/config.yaml
@@ -21,3 +21,5 @@ beef:
name: "Spring Framework Malicious Jar Exploit"
description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).
Specify the URL for a form controller on the target and the URL for your malicious JAR file.
For more information see: http://www.exploit-db.com/exploits/13918/
Versions Affected:
3.0.0 to 3.0.2
2.5.0 to 2.5.6.SEC01 (community releases)
2.5.0 to 2.5.7 (subscription customers)"
authors: ["bcoles"]
+ target:
+ unknown: ["ALL"]
diff --git a/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml b/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml
index 653c95f3f..1832d8a16 100644
--- a/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml
+++ b/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml
@@ -21,3 +21,5 @@ beef:
name: "AlienVault OSSIM 3.1 XSS"
description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.
For more information see: http://www.exploit-db.com/exploits/20062/"
authors: ["bcoles", "muts"]
+ target:
+ unknown: ["ALL"]
diff --git a/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml b/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml
index c5b1f6b7d..9272039db 100644
--- a/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml
+++ b/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml
@@ -21,3 +21,5 @@ beef:
name: "Cisco Collaboration Server 5 XSS"
description: "Attempts to hook Cisco Collaboration Server 5 using XSS.
For more information see: http://www.exploit-db.com/exploits/11403/"
authors: ["bcoles", "s4squatch"]
+ target:
+ unknown: ["ALL"]
diff --git a/modules/exploits/xss/serendipity_1.6_xss/config.yaml b/modules/exploits/xss/serendipity_1.6_xss/config.yaml
index 4aea5824b..58cc51e18 100644
--- a/modules/exploits/xss/serendipity_1.6_xss/config.yaml
+++ b/modules/exploits/xss/serendipity_1.6_xss/config.yaml
@@ -21,3 +21,5 @@ beef:
name: "Serendipity <= 1.6 XSS"
description: "Attempts to hook Serendipity <= 1.6 using XSS.
For more information see: http://www.exploit-db.com/exploits/18884/"
authors: ["bcoles", "Stefan Schurtz"]
+ target:
+ unknown: ["ALL"]