We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 9c1a43a commit cd15996Copy full SHA for cd15996
modules/exploits/windows/smb/psexec_psh.rb
@@ -59,6 +59,7 @@ def initialize(info = {})
59
[ 'Windows x64', { 'Arch' => ARCH_X86_64 } ]
60
],
61
'DefaultTarget' => 0,
62
+ 'DisclosureDate' => 'Jan 01 1999',
63
'References' => [
64
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
65
[ 'OSVDB', '3106'],
@@ -69,7 +70,6 @@ def initialize(info = {})
69
70
))
71
end
72
-
73
def exploit
74
command = cmd_psh_payload(payload.encoded)
75
@@ -104,5 +104,5 @@ def exploit
104
def peer
105
return "#{rhost}:#{rport}"
106
107
108
+
0 commit comments