We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 036d050 commit 106f265Copy full SHA for 106f265
modules/auxiliary/admin/http/nuuo_nvrmini_reset.rb
@@ -6,8 +6,7 @@
6
require 'msf/core'
7
8
class MetasploitModule < Msf::Auxiliary
9
- Rank = ExcellentRanking
10
-
+
11
include Msf::Exploit::Remote::HttpClient
12
include Msf::Auxiliary::Report
13
@@ -33,7 +32,7 @@ def initialize(info = {})
33
32
['CVE', '2016-5676'],
34
['US-CERT-VU', '856152'],
35
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-nvr-vulns.txt'],
36
- ['URL', 'TODO_FULLDISC_URL']
+ ['URL', 'http://seclists.org/bugtraq/2016/Aug/45']
37
],
38
'DefaultTarget' => 0,
39
'DisclosureDate' => 'Aug 4 2016'))
0 commit comments