We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent ccf7314 commit 819a49bCopy full SHA for 819a49b
modules/exploits/linux/http/multi_ncc_ping_exec.rb
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
15
16
def initialize(info = {})
17
super(update_info(info,
18
- 'Name' => 'D-Link/TRENDnet ncc Command Injection (ping.ccp)',
+ 'Name' => 'D-Link/TRENDnet NCC Command Injection (ping.ccp)',
19
'Description' => %q{
20
This module exploits a remote command injection vulnerability on several routers.
21
This module was tested in an emulated environment of a DIR-626L only. Several
0 commit comments