Switch to using :method, see previous commit

This commit is contained in:
James Lee 2012-04-17 18:48:14 -06:00
parent 741de34d92
commit f9a48ace48
6 changed files with 6 additions and 6 deletions

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => OperatingSystems::WINDOWS,
:vuln_test => "GetVariable",
:method => "GetVariable",
:classid => "ShockwaveFlash.ShockwaveFlash",
:rank => NormalRanking, # reliable memory corruption
:javascript => true

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
:javascript => true,
:rank => NormalRanking,
:classid => "{79956462-F148-497F-B247-DF35A095F80B}",
:vuln_test => "DownloadImageFileURL",
:method => "DownloadImageFileURL",
})
def initialize(info = {})

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
:javascript => true,
:rank => NormalRanking,
:classid => "{84B74E82-3475-420E-9949-773B4FB91771}",
:vuln_test => "RunAndUploadFile",
:method => "RunAndUploadFile",
})
def initialize(info={})

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_maxver => "6.1",
:javascript => true,
:os_name => OperatingSystems::WINDOWS,
:vuln_test => 'CreateObject',
:method => [ 'CreateObject', 'GetObject' ],
:classid =>
[
'{BD96C556-65A3-11D0-983A-00C04FC29E36}',

View File

@ -29,8 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :javascript => true,
# :os_name => OperatingSystems::WINDOWS,
# :vuln_test => 'KeyFrame',
# :classid => 'DirectAnimation.PathControl',
# :method => 'KeyFrame',
# :rank => NormalRanking # reliable memory corruption
#})

View File

@ -21,8 +21,8 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_name => HttpClients::IE,
:javascript => true,
:os_name => OperatingSystems::WINDOWS,
:vuln_test => 'CreateNewFolderFromName',
:classid => '{A09AE68F-B14D-43ED-B713-BA413F034904}',
:method => 'CreateNewFolderFromName',
:rank => NormalRanking # reliable memory corruption
})