diff --git a/modules/exploits/windows/browser/vlc_amv.rb b/modules/exploits/windows/browser/vlc_amv.rb index 49e366579f..17d9b305bb 100644 --- a/modules/exploits/windows/browser/vlc_amv.rb +++ b/modules/exploits/windows/browser/vlc_amv.rb @@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ ['CVE', 'CVE-2010-3275'], + ['OSVDB', '71277'], ['URL', 'http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files'], ], 'Payload' => @@ -163,4 +164,4 @@ class Metasploit3 < Msf::Exploit::Remote print_status("Sending malicious page to #{cli.peerhost}:#{cli.peerport}...") send_response( cli, html, {'Content-Type' => 'text/html'} ) end -end \ No newline at end of file +end