We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent d1e8b16 commit 0ab2e99Copy full SHA for 0ab2e99
modules/auxiliary/scanner/http/wildfly_traversal.rb
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
13
14
def initialize(info = {})
15
super(update_info(info,
16
- 'Name' => 'WildFly 8 Directory Traversal',
+ 'Name' => 'WildFly Directory Traversal',
17
'Description' => %q{
18
This module exploits a directory traversal vulnerability found in the WildFly 8.1.0.Final
19
web server running on port 8080, named JBoss Undertow. The vulnerability only affects to
0 commit comments