diff --git a/modules/exploits/multi/misc/persistent_hpca_radexec_exec.rb b/modules/exploits/multi/misc/persistent_hpca_radexec_exec.rb index 43d39c9621..501df43124 100644 --- a/modules/exploits/multi/misc/persistent_hpca_radexec_exec.rb +++ b/modules/exploits/multi/misc/persistent_hpca_radexec_exec.rb @@ -17,8 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a command injection vulnerability on HP Client Automation, distributed actually as Persistent Systems Client Automation. The vulnerability exists in the Notify - Daemon (radexecd.exe), which doesn't authenticate execution requests by default neither. - This module has been tested successfully on HP Client Automation 9.00 over Windows 2003 SP2 + Daemon (radexecd.exe), which doesn't authenticate execution requests by default. + + This module has been tested successfully on HP Client Automation 9.00 on Windows 2003 SP2 and CentOS 5. }, 'Author' =>