From e7485bd02f83c460039a81cc5a45f48e6dffc834 Mon Sep 17 00:00:00 2001 From: Shreya <shreya.malviya@gmail.com> Date: Sun, 10 Jan 2021 00:40:09 +0530 Subject: [PATCH] Mention CVE --- .../cc/services/config_schema/definitions/exploiter_classes.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py index 2cbbca431..0d123ac49 100644 --- a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py +++ b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py @@ -155,7 +155,7 @@ EXPLOITER_CLASSES = { "ZerologonExploiter" ], "title": "Zerologon Exploiter (UNSAFE)", - "info": "Unsafe exploiter (changes the password of a Windows server domain controller account and " + "info": "CVE-2020-1472. Unsafe exploiter (changes the password of a Windows server domain controller account and " "breaks communication with other domain controllers.) " "Exploits a privilege escalation vulnerability in a Windows server domain controller, " "using the Netlogon Remote Protocol (MS-NRPC).",