We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e690583 commit 442d212Copy full SHA for 442d212
lib/msf/core/exploit/remote/browser_exploit_server.rb
@@ -175,6 +175,8 @@ def get_bad_requirements(profile)
175
# Special keys to ignore because the script registers this as [:activex] = true or false
176
next if k == :clsid or k == :method
177
178
+ vprint_debug("Comparing requirement: #{k}=#{v} vs k=#{profile[k.to_sym]}")
179
+
180
if v.is_a? Regexp
181
bad_reqs << k if profile[k.to_sym] !~ v
182
elsif v.is_a? Proc
0 commit comments