fixed errors in dopewars.rb shown by msftidy
parent
b5c3161ceb
commit
70da739666
|
@ -1,8 +1,9 @@
|
||||||
# Dopewars DOS attack
|
##
|
||||||
#
|
# This file is part of the Metasploit Framework and may be subject to
|
||||||
# The jet command in Dopewars <= 1.5.12 is vulnerable to a segmentaion
|
# redistribution and commercial restrictions. Please see the Metasploit
|
||||||
# fault due to a lack of input validation.
|
# web site for more information on licensing and terms of use.
|
||||||
#
|
# http://metasploit.com/
|
||||||
|
##
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
|
|
||||||
|
@ -23,7 +24,7 @@ class Metasploit4 < Msf::Auxiliary
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'BID', '36606' ],
|
[ 'BID', '36606' ],
|
||||||
[ 'CVE', 'CVE-2009-3591' ],
|
[ 'CVE', '2009-3591' ],
|
||||||
]))
|
]))
|
||||||
|
|
||||||
register_options([Opt::RPORT(7902),], self.class)
|
register_options([Opt::RPORT(7902),], self.class)
|
||||||
|
|
Loading…
Reference in New Issue