get rid of some more ^Ms
git-svn-id: file:///home/svn/framework3/trunk@7880 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
48c3709a25
commit
2570fcee15
|
@ -22,6 +22,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
include Msf::Exploit::Remote::BrowserAutopwn
|
||||
autopwn_info({
|
||||
:ua_name => HttpClients::IE,
|
||||
# In badly misconfigured situations, IE7 and 8 could be vulnerable to
|
||||
# this, but by default they throw an ugly popup that stops all script
|
||||
# execution until the user deals with it and aborts everything if they
|
||||
# click "no". Not worth the risk of being unable to try more recent
|
||||
# exploits.
|
||||
:ua_maxver => "6.0",
|
||||
:javascript => true,
|
||||
:os_name => OperatingSystems::WINDOWS,
|
||||
:vuln_test => 'CreateObject',
|
||||
|
@ -41,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'{0006F033-0000-0000-C000-000000000046}',
|
||||
'{0006F03A-0000-0000-C000-000000000046}',
|
||||
],
|
||||
:rank => ExcellentRanking # reliable exe writer
|
||||
#:rank => ExcellentRanking # reliable exe writer
|
||||
})
|
||||
|
||||
def initialize(info = {})
|
||||
|
|
Loading…
Reference in New Issue