From 32dafb06afc67f02f587dbba40c3663794342bbf Mon Sep 17 00:00:00 2001 From: Brendan Coles Date: Mon, 8 May 2017 22:29:44 +0000 Subject: [PATCH] Replace NoTarget with NotVulnerable --- .../exploits/windows/http/serviio_checkstreamurl_cmd_exec.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/serviio_checkstreamurl_cmd_exec.rb b/modules/exploits/windows/http/serviio_checkstreamurl_cmd_exec.rb index 38d88ff4b4..2f4ada5621 100644 --- a/modules/exploits/windows/http/serviio_checkstreamurl_cmd_exec.rb +++ b/modules/exploits/windows/http/serviio_checkstreamurl_cmd_exec.rb @@ -95,7 +95,7 @@ class MetasploitModule < Msf::Exploit::Remote end def exploit - fail_with(Failure::NoTarget, 'Target is not vulnerable') unless check == CheckCode::Appears + fail_with(Failure::NotVulnerable, 'Target is not vulnerable') unless check == CheckCode::Appears execute_cmdstager(:temp => '.', :linemax => 8000) end end