File tree Expand file tree Collapse file tree 3 files changed +10
-6
lines changed Expand file tree Collapse file tree 3 files changed +10
-6
lines changed Original file line number Diff line number Diff line change @@ -20,9 +20,13 @@ def initialize(info={})
20
20
21
21
Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.160,
22
22
Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.160,
23
- Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160, and
24
- Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466.
23
+ Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160,
24
+ Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466, and
25
25
Ubuntu 14.04.2 LTS, Firefox 35.01, and Adobe Flash 11.2.202.466.
26
+
27
+ Note that this exploit is effective against both CVE-2015-3113 and the
28
+ earlier CVE-2015-3043, since CVE-2015-3113 is effectively a regression
29
+ to the same root cause as CVE-2015-3043.
26
30
} ,
27
31
'License' => MSF_LICENSE ,
28
32
'Author' =>
Original file line number Diff line number Diff line change @@ -22,9 +22,9 @@ def initialize(info={})
22
22
'Name' => 'Windows Gather Credentials Local Administrator Password Solution' ,
23
23
'Description' => %Q{
24
24
This module will recover the LAPS (Local Administrator Password Solution) passwords,
25
- configured in active directory. Note, only privileged users should be able to access
26
- these fields. Note: The local administrator account name is not stored in active directory ,
27
- so we assume that this will be 'Administrator' by default.
25
+ configured in Active Directory, which is usually only accessible by privileged users.
26
+ Note that the local administrator account name is not stored in Active Directory ,
27
+ so it is assumed to be 'Administrator' by default.
28
28
} ,
29
29
'License' => MSF_LICENSE ,
30
30
'Author' =>
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ def initialize(info = {})
16
16
'Name' => 'Windows Gather Active Directory BitLocker Recovery' ,
17
17
'Description' => %q{
18
18
This module will enumerate BitLocker recovery passwords in the default AD
19
- directory. Requires Domain Admin or other delegated privileges.
19
+ directory. This module does require Domain Admin or other delegated privileges.
20
20
} ,
21
21
'License' => MSF_LICENSE ,
22
22
'Author' => [ 'Ben Campbell <ben.campbell[at]mwrinfosecurity.com>' ] ,
You can’t perform that action at this time.
0 commit comments