Ugh. Apparently target can't be null. Fixed.

This commit is contained in:
bcoles
2012-09-30 18:50:28 +09:30
parent a135e9f51f
commit ba20f17831
7 changed files with 13 additions and 1 deletions

View File

@@ -21,3 +21,5 @@ beef:
name: "Axous <= 1.1.1 Add User CSRF"
description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)."
authors: ["bcoles", "Ivano Binetti"]
target:
unknown: ["ALL"]

View File

@@ -21,3 +21,5 @@ beef:
name: "boastMachine <= 3.1 Add User CSRF"
description: "Attempts to add a user to a boastMachine <= 3.1 install."
authors: ["bcoles", "Dr.NaNo"]
target:
unknown: ["ALL"]

View File

@@ -22,7 +22,7 @@ beef:
enable: true
category: ["Exploits", "NAS"]
name: "FreeNAS Reverse Root Shell CSRF"
description: "Attempts to get a reverse root shell on a FreeNAS server.<br/>Tested on version 8.2.0 however other versions are likely to be vulnerable."
description: "Attempts to get a reverse root shell on a FreeNAS server.<br/>Tested on version 8.2.0 however other versions are likely to be vulnerable.<br/>Patched in version 8.3.0-BETA3."
authors: ["bcoles"]
target:
working: ["ALL"]

View File

@@ -21,3 +21,5 @@ beef:
name: "Spring Framework Malicious Jar Exploit"
description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).<br/>Specify the URL for a form controller on the target and the URL for your malicious JAR file.<br/>For more information see: http://www.exploit-db.com/exploits/13918/<br/><br/>Versions Affected:<br/>3.0.0 to 3.0.2<br/>2.5.0 to 2.5.6.SEC01 (community releases)<br/>2.5.0 to 2.5.7 (subscription customers)"
authors: ["bcoles"]
target:
unknown: ["ALL"]

View File

@@ -21,3 +21,5 @@ beef:
name: "AlienVault OSSIM 3.1 XSS"
description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/20062/"
authors: ["bcoles", "muts"]
target:
unknown: ["ALL"]

View File

@@ -21,3 +21,5 @@ beef:
name: "Cisco Collaboration Server 5 XSS"
description: "Attempts to hook Cisco Collaboration Server 5 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/11403/"
authors: ["bcoles", "s4squatch"]
target:
unknown: ["ALL"]

View File

@@ -21,3 +21,5 @@ beef:
name: "Serendipity <= 1.6 XSS"
description: "Attempts to hook Serendipity <= 1.6 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/18884/"
authors: ["bcoles", "Stefan Schurtz"]
target:
unknown: ["ALL"]