diff --git a/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb b/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb index 86f121663f..d0ef0c5c2f 100644 --- a/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb +++ b/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb @@ -27,6 +27,7 @@ class Metasploit3 < Msf::Auxiliary ], 'References' => [ + ['OSVDB', '77455'], ['URL', 'http://www.exploit-db.com/exploits/18189/'], ['URL', 'http://secpod.org/advisories/SecPod_Ipswitch_TFTP_Server_Dir_Trav.txt'] ], @@ -88,4 +89,4 @@ end =begin Remote code execution might be unlikely with this directory traversal bug, because WRITE requests are forbidden by default, and cannot be changed. -=end \ No newline at end of file +=end