parent
6feae9524b
commit
94b4bc24bd
|
@ -17,8 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a command injection vulnerability on HP Client Automation, distributed
|
||||
actually as Persistent Systems Client Automation. The vulnerability exists in the Notify
|
||||
Daemon (radexecd.exe), which doesn't authenticate execution requests by default neither.
|
||||
This module has been tested successfully on HP Client Automation 9.00 over Windows 2003 SP2
|
||||
Daemon (radexecd.exe), which doesn't authenticate execution requests by default.
|
||||
|
||||
This module has been tested successfully on HP Client Automation 9.00 on Windows 2003 SP2
|
||||
and CentOS 5.
|
||||
},
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue