From b5f41b29150380b7f9dc632c639f171773ab1c3a Mon Sep 17 00:00:00 2001 From: wchen-r7 Date: Wed, 18 Jan 2017 11:09:52 -0600 Subject: [PATCH] Update advantech_webaccess_dbvisitor_sqli name --- .../auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb b/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb index ae53f79f2d..12b7a41335 100644 --- a/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb +++ b/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb @@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'Advantech WebAccess SQL Injection', + 'Name' => 'Advantech WebAccess DBVisitor.dll ChartThemeConfig SQL Injection', 'Description' => %q{ This module exploits a SQL injection vulnerability found in Advantech WebAccess 7.1. The vulnerability exists in the DBVisitor.dll component, and can be abused through malicious