We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 377905b commit 736f8dbCopy full SHA for 736f8db
modules/exploits/windows/browser/honeywell_tema_exec.rb
@@ -12,18 +12,6 @@ class Metasploit3 < Msf::Exploit::Remote
12
13
include Msf::Exploit::Remote::HttpServer::HTML
14
include Msf::Exploit::EXE
15
- include Msf::Exploit::Remote::BrowserAutopwn
16
-
17
- autopwn_info({
18
- :ua_name => HttpClients::IE,
19
- :ua_minver => "6.0",
20
- :ua_maxver => "8.0",
21
- :javascript => true,
22
- :os_name => OperatingSystems::WINDOWS,
23
- :rank => NormalRanking,
24
- :classid => "{E01DF79C-BE0C-4999-9B13-B5F7B2306E9B}",
25
- :method => "DownloadFromURL"
26
- })
27
28
def initialize(info={})
29
super(update_info(info,
0 commit comments