Move local exploit to correct location

bug/bundler_fix
jvazquez-r7 2015-09-25 11:37:38 -05:00
parent 6b46316a56
commit c8880e8ad6
No known key found for this signature in database
GPG Key ID: 38D99152B9352D83
1 changed files with 3 additions and 3 deletions

View File

@ -18,10 +18,10 @@ class Metasploit4 < Msf::Exploit::Local
def initialize(info = {})
super(update_info(info,
'Name' => 'Watchguard XCS Local Privilege Escalation',
'Name' => 'Watchguard XCS FixCorruptMail Local Privilege Escalation',
'Description' => %q{
This module exploits a vulnerability in the Watchguard XCS 'FixCorruptMail' script called by root's crontab
which can be exploited to run a command as root within 3 minutes.
This module exploits a vulnerability in the Watchguard XCS 'FixCorruptMail' script called
by root's crontab which can be exploited to run a command as root within 3 minutes.
},
'Author' =>
[