Merge branch 'release/2012030701' of r7.github.com:rapid7/metasploit-framework into release/2012030701

unstable
Jonathan Cran 2012-03-08 10:23:46 -06:00
commit 046857f3ab
5 changed files with 10 additions and 10 deletions

View File

@ -17,9 +17,9 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => 'Apple Filing Protocol Info Enumerator',
'Description' => %q{
This module fetch AFP server information.
Including Server name, network address, supported AFP versions,
signature, machine type ,and server flags.
This module fetches AFP server information, including server name,
network address, supported AFP versions, signature, machine type,
and server flags.
},
'References' =>
[

View File

@ -18,8 +18,8 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => 'MongoDB Login Utility',
'Description' => %q{
This module scans for MongoDB server. By default MongoDB has no auth. If auth
is used, it is then possible to execute a brute force attack on the server.
This module attempts to brute force authentication credentials for MongoDB.
Note that, by default, MongoDB does not require authentication.
},
'References' =>
[

View File

@ -17,9 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => "ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow",
'Description' => %q{
This module exploits a vulnerability found in ASUS Net4Switch's ipswcom.dll
ActiveX control. A buffer overflow condition is possible in multiple places all
because of the poor use of the CxDbgPrint() function, which allows remote attackers
to gain arbitrary code execution under the context of the user.
ActiveX control. A buffer overflow condition is possible in multiple places due
to the use of the CxDbgPrint() function, which allows remote attackers to gain
arbitrary code execution under the context of the user.
},
'License' => MSF_LICENSE,
'Author' =>

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'IBM Personal Communications I-Series Access WorkStation 5.9 Profile',
'Description' => %q{
The IBM Personal Communications I-Series application WorkStation is susceptible to a
The IBM Personal Communications I-Series application WorkStation is susceptible to a
stack-based buffer overflow vulnerability within file parsing in which data copied to a
location in memory exceeds the size of the reserved destination area. The buffer is located
on the runtime program stack.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module exploits a vulnerability found in Sysax's SSH service. By
supplying a long username, the SSH server will copy that data on the stack
without any proper bounds checking, therefore allowing remote code execution
without proper bounds checking, therefore allowing remote code execution
under the context of the user. Please note that previous versions
(before 5.53) are also affected by this bug.
},