diff --git a/modules/exploits/windows/local/capcom_sys_exec.rb b/modules/exploits/windows/local/capcom_sys_exec.rb index 842a5afe08..c17ef04efe 100644 --- a/modules/exploits/windows/local/capcom_sys_exec.rb +++ b/modules/exploits/windows/local/capcom_sys_exec.rb @@ -17,7 +17,7 @@ class MetasploitModule < Msf::Exploit::Local def initialize(info={}) super(update_info(info, { - 'Name' => 'Windows Capcom.sys kernel execution exploit (x64 only)', + 'Name' => 'Windows Capcom.sys Kernel Execution Exploit (x64 only)', 'Description' => %q{ This module abuses the Capcom.sys kernel driver's function that allows for an arbitrary function to be executed in the kernel from user land. This function @@ -45,6 +45,7 @@ class MetasploitModule < Msf::Exploit::Local 'References' => [ ['URL', 'https://twitter.com/TheWack0lian/status/779397840762245124'] ], + 'DisclosureDate' => 'Jan 01 1999', # non-vuln exploit date 'DefaultTarget' => 0 })) end