We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent f07c5de commit e202bc1Copy full SHA for e202bc1
modules/exploits/unix/webapp/joomla_akeeba_exec.rb
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
16
17
def initialize(info={})
18
super(update_info(info,
19
- 'Name' => "Joomla / Akeeba Kickstart Remote Code Execution",
+ 'Name' => "Joomla Akeeba Kickstart Unserialize Remote Code Execution",
20
'Description' => %q{
21
This module exploits a vulnerability found in Joomla! through 2.5.25, 3.2.5 and earlier
22
3.x versions and 3.3.0 through 3.3.4 versions. The vulnerability affects the Akeeba
0 commit comments