We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7dee4ff commit 807e2dfCopy full SHA for 807e2df
modules/exploits/windows/scada/abb_wserver_exec.rb
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
13
14
def initialize(info = {})
15
super(update_info(info,
16
- 'Name' => 'ABB MicroSCADA Stack Buffer Overflow',
+ 'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution',
17
'Description' => %q{
18
This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The
19
vulnerability exists on the wserver.exe component, disabled by default but required when
0 commit comments