From e7485bd02f83c460039a81cc5a45f48e6dffc834 Mon Sep 17 00:00:00 2001
From: Shreya <shreya.malviya@gmail.com>
Date: Sun, 10 Jan 2021 00:40:09 +0530
Subject: [PATCH] Mention CVE

---
 .../cc/services/config_schema/definitions/exploiter_classes.py  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py
index 2cbbca431..0d123ac49 100644
--- a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py
+++ b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py
@@ -155,7 +155,7 @@ EXPLOITER_CLASSES = {
                 "ZerologonExploiter"
             ],
             "title": "Zerologon Exploiter (UNSAFE)",
-            "info": "Unsafe exploiter (changes the password of a Windows server domain controller account and "
+            "info": "CVE-2020-1472. Unsafe exploiter (changes the password of a Windows server domain controller account and "
                     "breaks communication with other domain controllers.) "
                     "Exploits a privilege escalation vulnerability in a Windows server domain controller, "
                     "using the Netlogon Remote Protocol (MS-NRPC).",