We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 2b55e0e commit 89f649aCopy full SHA for 89f649a
modules/exploits/multi/http/rails_xml_yaml_code_exec.rb
@@ -38,8 +38,9 @@ def initialize(info = {})
38
'License' => MSF_LICENSE,
39
'References' =>
40
[
41
- ['CVE', '2013-0156'],
42
- ['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156']
+ [ 'CVE', '2013-0156' ],
+ [ 'OSVDB', '89026' ],
43
+ [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156' ]
44
],
45
'Platform' => 'ruby',
46
'Arch' => ARCH_RUBY,
0 commit comments