We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent c359e15 commit 3c2dc68Copy full SHA for 3c2dc68
modules/exploits/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi.rb
@@ -21,8 +21,7 @@ def initialize(info = {})
21
The first is an authentication bypass vulnerability via a file delete in logoff.cgi
22
which resets the admin password back to 'admin' upon a reboot (CVE-2016-7552).
23
The second is a cmdi flaw using the timezone parameter in the admin_sys_time.cgi
24
- interface (CVE-2016-7547). You have the option to use the authentication bypass or
25
- not since it requires that the server is rebooted.
+ interface (CVE-2016-7547).
26
27
Note: You have the option to use the authentication bypass or not since it requires
28
that the server is rebooted. The password reset will render the authentication useless.
0 commit comments