We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent bcdea05 commit 4733416Copy full SHA for 4733416
modules/exploits/multi/http/manage_engine_dc_pmp_sqli.rb
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
15
16
def initialize(info={})
17
super(update_info(info,
18
- 'Name' => "ManageEngine Password Manager MetadataServlet.dat SQL Injection",
+ 'Name' => "ManageEngine Desktop Central / Password Manager LinkViewFetchServlet.dat SQL Injection",
19
'Description' => %q{
20
This module exploits an unauthenticated blind SQL injection in LinkViewFetchServlet,
21
which is exposed in ManageEngine Desktop Central v7 build 70200 to v9 build 90033 and
0 commit comments