File tree Expand file tree Collapse file tree 1 file changed +2
-1
lines changed
modules/exploits/windows/local Expand file tree Collapse file tree 1 file changed +2
-1
lines changed Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ class MetasploitModule < Msf::Exploit::Local
17
17
18
18
def initialize ( info = { } )
19
19
super ( update_info ( info , {
20
- 'Name' => 'Windows Capcom.sys kernel execution exploit (x64 only)' ,
20
+ 'Name' => 'Windows Capcom.sys Kernel Execution Exploit (x64 only)' ,
21
21
'Description' => %q{
22
22
This module abuses the Capcom.sys kernel driver's function that allows for an
23
23
arbitrary function to be executed in the kernel from user land. This function
@@ -45,6 +45,7 @@ def initialize(info={})
45
45
'References' => [
46
46
[ 'URL' , 'https://twitter.com/TheWack0lian/status/779397840762245124' ]
47
47
] ,
48
+ 'DisclosureDate' => 'Jan 01 1999' , # non-vuln exploit date
48
49
'DefaultTarget' => 0
49
50
} ) )
50
51
end
You can’t perform that action at this time.
0 commit comments