From 57c32c9c7bb363b45237821206d5b57538f4933c Mon Sep 17 00:00:00 2001 From: sinn3r Date: Tue, 7 Aug 2012 12:20:44 -0500 Subject: [PATCH] Slip Plixer's name in there, because it's their product. --- modules/exploits/windows/http/sonicwall_scrutinizer_sqli.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/sonicwall_scrutinizer_sqli.rb b/modules/exploits/windows/http/sonicwall_scrutinizer_sqli.rb index c5d4af89bc..13e4af71ac 100644 --- a/modules/exploits/windows/http/sonicwall_scrutinizer_sqli.rb +++ b/modules/exploits/windows/http/sonicwall_scrutinizer_sqli.rb @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info={}) super(update_info(info, - 'Name' => "Dell SonicWALL Scrutinizer 9 SQL Injection", + 'Name' => "Dell SonicWALL (Plixer) Scrutinizer 9 SQL Injection", 'Description' => %q{ This module exploits a vulnerability found in Dell SonicWall Scrutinizer. While handling the 'q' parameter, the PHP application does not properly filter