Update description with tested versions.
parent
14f0409c6c
commit
241786e71f
|
@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
has a default password of "plugin" which can not be reset through the user interface. By
|
||||
log-in and abusing the default administrator's SQL query functionality, it's possible to
|
||||
write a WAR payload to disk and trigger an automatic deployment of this payload. This
|
||||
module has been tested successfully on OpManager v11.5 and v11.6 for Windows.
|
||||
module has been tested successfully on OpManager v11.0 and v11.4-v11.6 for Windows.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue