diff --git a/modules/exploits/windows/mysql/scrutinizer_upload_exec.rb b/modules/exploits/windows/mysql/scrutinizer_upload_exec.rb index 0cd2de04ec..9618e463ce 100644 --- a/modules/exploits/windows/mysql/scrutinizer_upload_exec.rb +++ b/modules/exploits/windows/mysql/scrutinizer_upload_exec.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info={}) super(update_info(info, - 'Name' => "Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential", + 'Name' => "Plixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential", 'Description' => %q{ This exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer. By default, the software installs a default password in MySQL, and binds the