mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Update name to mention DC; correct servlet name
This commit is contained in:
parent
bcdea05b51
commit
473341610c
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "ManageEngine Password Manager MetadataServlet.dat SQL Injection",
|
||||
'Name' => "ManageEngine Desktop Central / Password Manager LinkViewFetchServlet.dat SQL Injection",
|
||||
'Description' => %q{
|
||||
This module exploits an unauthenticated blind SQL injection in LinkViewFetchServlet,
|
||||
which is exposed in ManageEngine Desktop Central v7 build 70200 to v9 build 90033 and
|
||||
|
Loading…
Reference in New Issue
Block a user