diff --git a/modules/exploits/safari_launch_app/config.yaml b/modules/exploits/safari_launch_app/config.yaml index 1099bb595..25840021b 100755 --- a/modules/exploits/safari_launch_app/config.yaml +++ b/modules/exploits/safari_launch_app/config.yaml @@ -19,8 +19,7 @@ beef: enable: true category: "Exploits" name: "Safari Launch App" - description: "Launch an application from the victim machine.

See CVE-2011-3230 for more details." - notes: "Safari <= 5.1 on OS X is vulnerable. Original discovery by Aaron Sigel. Also see CVE-2011-3230" + description: "Launch an application from the victim machine.

See CVE-2011-3230 for more details.

Safari <= 5.1 on OS X is vulnerable. Original discovery by Aaron Sigel. Also see CVE-2011-3230" authors: ["antisnatchor"] target: user_notify: ["S"] diff --git a/modules/host/detect_protocol_handlers/config.yaml b/modules/host/detect_protocol_handlers/config.yaml index baf8fe08d..a3de123a2 100644 --- a/modules/host/detect_protocol_handlers/config.yaml +++ b/modules/host/detect_protocol_handlers/config.yaml @@ -19,8 +19,7 @@ beef: enable: true category: "Host" name: "Get Protocol Handlers" - description: "This module attempts to identify protocol handlers present on the hooked browser." - notes: "Only Internet Explorer and Firefox are supported.

Firefox users are prompted to launch the application for which the protocol handler is responsible.

Firefox users are warned when there is no application assigned to a protocol handler.



The possible return values are: unknown, exists, does not exist" + description: "This module attempts to identify protocol handlers present on the hooked browser. Only Internet Explorer and Firefox are supported.

Firefox users are prompted to launch the application for which the protocol handler is responsible.

Firefox users are warned when there is no application assigned to a protocol handler.



The possible return values are: unknown, exists, does not exist." authors: ["bcoles"] target: working: ["IE"] diff --git a/modules/ipec/window_mail_client_dos/config.yaml b/modules/ipec/window_mail_client_dos/config.yaml index d7be2489d..8f1b007bc 100644 --- a/modules/ipec/window_mail_client_dos/config.yaml +++ b/modules/ipec/window_mail_client_dos/config.yaml @@ -19,8 +19,7 @@ beef: enable: true category: "IPEC" name: "Windows Mail Client DoS" - description: "This module exploits an unhandled exception in Windows Mail to crash the client remotely.

Windows Mail is launched and then crashed if it is not already open. It comes installed by default on Windows Vista (but it's vulnerable also in Win7-sp2)." - notes: "The protocol handler used will be: nntp.

" + description: "This module exploits an unhandled exception in Windows Mail to crash the client remotely.

Windows Mail is launched and then crashed if it is not already open. It comes installed by default on Windows Vista (but it's vulnerable also in Windows 7 SP2).

The protocol handler used will be: nntp." authors: ["bcoles"] target: user_notify: ["FF", "S"]