We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 14f0409 commit 241786eCopy full SHA for 241786e
modules/exploits/windows/http/manage_engine_opmanager_rce.rb
@@ -19,7 +19,7 @@ def initialize(info={})
19
has a default password of "plugin" which can not be reset through the user interface. By
20
log-in and abusing the default administrator's SQL query functionality, it's possible to
21
write a WAR payload to disk and trigger an automatic deployment of this payload. This
22
- module has been tested successfully on OpManager v11.5 and v11.6 for Windows.
+ module has been tested successfully on OpManager v11.0 and v11.4-v11.6 for Windows.
23
},
24
'License' => MSF_LICENSE,
25
'Author' =>
0 commit comments