We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 073ffcb commit 34ef650Copy full SHA for 34ef650
modules/exploits/windows/scada/advantech_webaccess_webvrpcs_bof.rb
@@ -3,8 +3,6 @@
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
-require 'msf/core'
7
-
8
class MetasploitModule < Msf::Exploit::Remote
9
10
Rank = ExcellentRanking
@@ -50,7 +48,7 @@ def initialize(info = {})
50
48
],
51
49
'DisclosureDate' => 'Dec 25 2017',
52
'DefaultTarget' => 0))
53
- register_options([ Opt::RPORT(4592)], self.class)
+ register_options([ Opt::RPORT(4592)])
54
end
55
56
def create_rop_chain()
0 commit comments