Ugh. Apparently target can't be null. Fixed.
This commit is contained in:
@@ -21,3 +21,5 @@ beef:
|
||||
name: "Axous <= 1.1.1 Add User CSRF"
|
||||
description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)."
|
||||
authors: ["bcoles", "Ivano Binetti"]
|
||||
target:
|
||||
unknown: ["ALL"]
|
||||
|
||||
@@ -21,3 +21,5 @@ beef:
|
||||
name: "boastMachine <= 3.1 Add User CSRF"
|
||||
description: "Attempts to add a user to a boastMachine <= 3.1 install."
|
||||
authors: ["bcoles", "Dr.NaNo"]
|
||||
target:
|
||||
unknown: ["ALL"]
|
||||
|
||||
@@ -22,7 +22,7 @@ beef:
|
||||
enable: true
|
||||
category: ["Exploits", "NAS"]
|
||||
name: "FreeNAS Reverse Root Shell CSRF"
|
||||
description: "Attempts to get a reverse root shell on a FreeNAS server.<br/>Tested on version 8.2.0 however other versions are likely to be vulnerable."
|
||||
description: "Attempts to get a reverse root shell on a FreeNAS server.<br/>Tested on version 8.2.0 however other versions are likely to be vulnerable.<br/>Patched in version 8.3.0-BETA3."
|
||||
authors: ["bcoles"]
|
||||
target:
|
||||
working: ["ALL"]
|
||||
|
||||
@@ -21,3 +21,5 @@ beef:
|
||||
name: "Spring Framework Malicious Jar Exploit"
|
||||
description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).<br/>Specify the URL for a form controller on the target and the URL for your malicious JAR file.<br/>For more information see: http://www.exploit-db.com/exploits/13918/<br/><br/>Versions Affected:<br/>3.0.0 to 3.0.2<br/>2.5.0 to 2.5.6.SEC01 (community releases)<br/>2.5.0 to 2.5.7 (subscription customers)"
|
||||
authors: ["bcoles"]
|
||||
target:
|
||||
unknown: ["ALL"]
|
||||
|
||||
@@ -21,3 +21,5 @@ beef:
|
||||
name: "AlienVault OSSIM 3.1 XSS"
|
||||
description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/20062/"
|
||||
authors: ["bcoles", "muts"]
|
||||
target:
|
||||
unknown: ["ALL"]
|
||||
|
||||
@@ -21,3 +21,5 @@ beef:
|
||||
name: "Cisco Collaboration Server 5 XSS"
|
||||
description: "Attempts to hook Cisco Collaboration Server 5 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/11403/"
|
||||
authors: ["bcoles", "s4squatch"]
|
||||
target:
|
||||
unknown: ["ALL"]
|
||||
|
||||
@@ -21,3 +21,5 @@ beef:
|
||||
name: "Serendipity <= 1.6 XSS"
|
||||
description: "Attempts to hook Serendipity <= 1.6 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/18884/"
|
||||
authors: ["bcoles", "Stefan Schurtz"]
|
||||
target:
|
||||
unknown: ["ALL"]
|
||||
|
||||
Reference in New Issue
Block a user