We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 5a7730b commit e0fa1d5Copy full SHA for e0fa1d5
modules/exploits/windows/local/bypassuac_injection.rb
@@ -211,12 +211,10 @@ def upload_payload_dll!
211
212
def validate_environment!
213
fail_with(Exploit::Failure::None, 'Already in elevated state') if is_admin? or is_system?
214
- #
215
- # Verify use against Vista+
216
+
217
winver = sysinfo["OS"]
218
219
- unless winver =~ /Windows Vista|Windows 2008|Windows [78]/
+ unless winver =~ /Windows 2008|Windows [7]/
220
fail_with(Exploit::Failure::NotVulnerable, "#{winver} is not vulnerable.")
221
end
222
0 commit comments