Update description with tested versions.

bug/bundler_fix
Pearce Barry 2017-06-20 15:32:08 -05:00
parent 14f0409c6c
commit 241786e71f
No known key found for this signature in database
GPG Key ID: 0916F4DEA5C5DE0A
1 changed files with 1 additions and 1 deletions

View File

@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
has a default password of "plugin" which can not be reset through the user interface. By has a default password of "plugin" which can not be reset through the user interface. By
log-in and abusing the default administrator's SQL query functionality, it's possible to log-in and abusing the default administrator's SQL query functionality, it's possible to
write a WAR payload to disk and trigger an automatic deployment of this payload. This write a WAR payload to disk and trigger an automatic deployment of this payload. This
module has been tested successfully on OpManager v11.5 and v11.6 for Windows. module has been tested successfully on OpManager v11.0 and v11.4-v11.6 for Windows.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>