We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 11e9cca commit 37312f2Copy full SHA for 37312f2
modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb
@@ -17,7 +17,7 @@ def initialize(info={})
17
super(update_info(info,
18
'Name' => "Honeywell HSC Remote Deployer ActiveX Remote Code Execution",
19
'Description' => %q{
20
- This modules exploits a vulnerability found in the Honeywell HSC Remote Deployer
+ This module exploits a vulnerability found in the Honeywell HSC Remote Deployer
21
ActiveX. This control can be abused by using the LaunchInstaller() function to
22
execute an arbitrary HTA from a remote location. This module has been tested
23
successfully with the HSC Remote Deployer ActiveX installed with Honeywell EBI
0 commit comments