diff --git a/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml b/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml index f1e802a65..c01ca6f49 100644 --- a/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml +++ b/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml @@ -21,3 +21,5 @@ beef: name: "Axous <= 1.1.1 Add User CSRF" description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)." authors: ["bcoles", "Ivano Binetti"] + target: + unknown: ["ALL"] diff --git a/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml b/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml index 6c703c02f..f16e2ece6 100644 --- a/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml +++ b/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml @@ -21,3 +21,5 @@ beef: name: "boastMachine <= 3.1 Add User CSRF" description: "Attempts to add a user to a boastMachine <= 3.1 install." authors: ["bcoles", "Dr.NaNo"] + target: + unknown: ["ALL"] diff --git a/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml b/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml index 012b7f74f..6232339f5 100644 --- a/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml +++ b/modules/exploits/nas/freenas_reverse_root_shell_csrf/config.yaml @@ -22,7 +22,7 @@ beef: enable: true category: ["Exploits", "NAS"] name: "FreeNAS Reverse Root Shell CSRF" - description: "Attempts to get a reverse root shell on a FreeNAS server.
Tested on version 8.2.0 however other versions are likely to be vulnerable." + description: "Attempts to get a reverse root shell on a FreeNAS server.
Tested on version 8.2.0 however other versions are likely to be vulnerable.
Patched in version 8.3.0-BETA3." authors: ["bcoles"] target: working: ["ALL"] diff --git a/modules/exploits/spring_framework_malicious_jar/config.yaml b/modules/exploits/spring_framework_malicious_jar/config.yaml index 7d5a17bc4..b898a24f2 100644 --- a/modules/exploits/spring_framework_malicious_jar/config.yaml +++ b/modules/exploits/spring_framework_malicious_jar/config.yaml @@ -21,3 +21,5 @@ beef: name: "Spring Framework Malicious Jar Exploit" description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).
Specify the URL for a form controller on the target and the URL for your malicious JAR file.
For more information see: http://www.exploit-db.com/exploits/13918/

Versions Affected:
3.0.0 to 3.0.2
2.5.0 to 2.5.6.SEC01 (community releases)
2.5.0 to 2.5.7 (subscription customers)" authors: ["bcoles"] + target: + unknown: ["ALL"] diff --git a/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml b/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml index 653c95f3f..1832d8a16 100644 --- a/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml +++ b/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml @@ -21,3 +21,5 @@ beef: name: "AlienVault OSSIM 3.1 XSS" description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.
For more information see: http://www.exploit-db.com/exploits/20062/" authors: ["bcoles", "muts"] + target: + unknown: ["ALL"] diff --git a/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml b/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml index c5b1f6b7d..9272039db 100644 --- a/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml +++ b/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml @@ -21,3 +21,5 @@ beef: name: "Cisco Collaboration Server 5 XSS" description: "Attempts to hook Cisco Collaboration Server 5 using XSS.
For more information see: http://www.exploit-db.com/exploits/11403/" authors: ["bcoles", "s4squatch"] + target: + unknown: ["ALL"] diff --git a/modules/exploits/xss/serendipity_1.6_xss/config.yaml b/modules/exploits/xss/serendipity_1.6_xss/config.yaml index 4aea5824b..58cc51e18 100644 --- a/modules/exploits/xss/serendipity_1.6_xss/config.yaml +++ b/modules/exploits/xss/serendipity_1.6_xss/config.yaml @@ -21,3 +21,5 @@ beef: name: "Serendipity <= 1.6 XSS" description: "Attempts to hook Serendipity <= 1.6 using XSS.
For more information see: http://www.exploit-db.com/exploits/18884/" authors: ["bcoles", "Stefan Schurtz"] + target: + unknown: ["ALL"]