Skip to content

Commit 807e2df

Browse files
committed
Fix title
1 parent 7dee4ff commit 807e2df

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/scada/abb_wserver_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'ABB MicroSCADA Stack Buffer Overflow',
16+
'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution',
1717
'Description' => %q{
1818
This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The
1919
vulnerability exists on the wserver.exe component, disabled by default but required when

0 commit comments

Comments
 (0)