We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent d923a5d commit 532ea5dCopy full SHA for 532ea5d
modules/exploits/windows/local/ms16_016_webdav.rb
@@ -50,8 +50,7 @@ def initialize(info={})
50
'References' =>
51
[
52
[ 'CVE', '2016-0051' ],
53
- [ 'MSB', 'MS16-016' ],
54
- [ 'URL', 'http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0051' ]
+ [ 'MSB', 'MS16-016' ]
55
],
56
'DisclosureDate' => 'Feb 09 2016',
57
'DefaultTarget' => 0
@@ -62,6 +61,8 @@ def check
62
61
if sysinfo["Architecture"] =~ /wow64/i or sysinfo["Architecture"] =~ /x64/
63
return Exploit::CheckCode::Safe
64
end
+
65
+ Exploit::CheckCode::Detected
66
67
68
def exploit
0 commit comments