fixed errors in dopewars.rb shown by msftidy
parent
b5c3161ceb
commit
70da739666
|
@ -1,8 +1,9 @@
|
|||
# Dopewars DOS attack
|
||||
#
|
||||
# The jet command in Dopewars <= 1.5.12 is vulnerable to a segmentaion
|
||||
# fault due to a lack of input validation.
|
||||
#
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
|
||||
|
@ -23,7 +24,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'BID', '36606' ],
|
||||
[ 'CVE', 'CVE-2009-3591' ],
|
||||
[ 'CVE', '2009-3591' ],
|
||||
]))
|
||||
|
||||
register_options([Opt::RPORT(7902),], self.class)
|
||||
|
|
Loading…
Reference in New Issue