commit
a1e51ffb0c
|
@ -586,7 +586,7 @@ module Msf
|
|||
vprint_status("Serving exploit to user #{cli.peerhost} with tag #{tag}")
|
||||
profile = browser_profile[tag]
|
||||
if profile.nil?
|
||||
print_status("Browsing visiting directly to the exploit URL is forbidden.")
|
||||
print_status("Browser visiting directly to the exploit URL is forbidden.")
|
||||
send_not_found(cli)
|
||||
elsif profile[:tried] && !datastore['Retries']
|
||||
print_status("Target #{cli.peerhost} with tag \"#{tag}\" wants to retry the module, not allowed.")
|
||||
|
|
Loading…
Reference in New Issue