We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 32188f0 commit 8978b1dCopy full SHA for 8978b1d
modules/exploits/multi/http/phpmoadmin_exec.rb
@@ -14,7 +14,7 @@ class Metasploit4 < Msf::Exploit::Remote
14
15
def initialize(info = {})
16
super(update_info(info,
17
- 'Name' => 'PHPMoAdmin Remote Code Execution',
+ 'Name' => 'PHPMoAdmin 1.1.2 Remote Code Execution',
18
'Description' => %q{
19
This module exploits an arbitrary PHP command execution vulnerability due to a
20
dangerous use of eval() in PHPMoAdmin.
0 commit comments