1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00
This commit is contained in:
Christian Mehlmauer 2015-01-30 15:41:11 +01:00
parent a0eaf2f626
commit 9ce2dd9815
No known key found for this signature in database
GPG Key ID: BCFF4FA966BC32C7

View File

@ -11,7 +11,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'WordPress XMLRPC Ghost vulnerability scanner',
'Name' => 'WordPress XMLRPC Ghost Vulnerability Scanner',
'Description' => %q{
This module can be used to determine hosts vulnerable to the Ghost vulnerability via
a call to the WordPress XMLRPC interface. If the target is vulnerable, the system
@ -42,7 +42,7 @@ class Metasploit3 < Msf::Auxiliary
OptInt.new('COUNT', [false, 'Number of iterations', 2500]),
], self.class)
end
def count
datastore['COUNT']
end