We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 379c0ef commit d6faf20Copy full SHA for d6faf20
modules/exploits/unix/webapp/horde_unserialize_exec.rb
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
12
13
def initialize(info = {})
14
super(update_info(info,
15
- 'Name' => 'Horde Unserialize PHP Code Execution',
+ 'Name' => 'Horde Framework Unserialize PHP Code Execution',
16
'Description' => %q{
17
This module exploits a php unserialize() vulnerability in Horde <= 5.1.1 which could be
18
abused to allow unauthenticated users to execute arbitrary code with the permissions of
0 commit comments