Vulnerable application link update

GSoC/Meterpreter_Web_Console
Daniel Teixeira 2018-03-22 11:57:54 +00:00 committed by GitHub
parent c84ece15a3
commit d192173792
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 1 additions and 1 deletions

View File

@ -1,5 +1,5 @@
## Description ## Description
This module exploits an Electron remote code execution vulnerability in Exodus wallet. Using the Electron remote code execution vulnerability in protocol handler is possible to inject command line arguments via URI handler. This module has been tested successfully on Windows 10 Enterprise x64. The vulnerable application is available for download at [Exodus v1.38.0](https://exodusbin.azureedge.net/releases/exodus-windows-x64-1.38.0.exe). This module exploits an Electron remote code execution vulnerability in Exodus wallet. Using the Electron remote code execution vulnerability in protocol handler is possible to inject command line arguments via URI handler. This module has been tested successfully on Windows 10 Enterprise x64. The vulnerable application is available for download at [Exodus v1.38.0](https://github.com/DanielRTeixeira/Exodus/raw/master/exodus-windows-x64-1.38.0.exe).
## Verification Steps ## Verification Steps
1. Install Exodus Wallet version `v1.38.0` 1. Install Exodus Wallet version `v1.38.0`