We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 1825b45 commit 896d6e8Copy full SHA for 896d6e8
modules/auxiliary/scanner/http/wp_gimedia_library_file_read.rb
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
13
14
def initialize(info = {})
15
super(update_info(info,
16
- 'Name' => 'WordPress GI-Media Library Plugin File Read Vulnerability',
+ 'Name' => 'WordPress GI-Media Library Plugin Directory Traversal Vulnerability',
17
'Description' => %q{
18
This module exploits a directory traversal vulnerability in WordPress Plugin
19
GI-Media Library version 2.2.2, allowing to read arbitrary files from the
0 commit comments