We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6feae95 commit 94b4bc2Copy full SHA for 94b4bc2
modules/exploits/multi/misc/persistent_hpca_radexec_exec.rb
@@ -17,8 +17,9 @@ def initialize(info = {})
17
'Description' => %q{
18
This module exploits a command injection vulnerability on HP Client Automation, distributed
19
actually as Persistent Systems Client Automation. The vulnerability exists in the Notify
20
- Daemon (radexecd.exe), which doesn't authenticate execution requests by default neither.
21
- This module has been tested successfully on HP Client Automation 9.00 over Windows 2003 SP2
+ Daemon (radexecd.exe), which doesn't authenticate execution requests by default.
+
22
+ This module has been tested successfully on HP Client Automation 9.00 on Windows 2003 SP2
23
and CentOS 5.
24
},
25
'Author' =>
0 commit comments