Add vendor's name in there fore better searching
parent
747a8aa54a
commit
0f37c1704d
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential",
|
||||
'Name' => "Plixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential",
|
||||
'Description' => %q{
|
||||
This exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer.
|
||||
By default, the software installs a default password in MySQL, and binds the
|
||||
|
|
Loading…
Reference in New Issue