From 57376a976d687c817699a5aa6c2941afa6ea9ef3 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Wed, 7 Mar 2012 09:17:22 -0600 Subject: [PATCH] Fixes descriptions on new modules. Fixing up grammar and removing some editorial verbiage. --- modules/auxiliary/scanner/afp/afp_server_info.rb | 6 +++--- modules/auxiliary/scanner/mongodb/mongodb_login.rb | 4 ++-- modules/exploits/windows/browser/asus_net4switch_ipswcom.rb | 6 +++--- modules/exploits/windows/fileformat/ibm_pcm_ws.rb | 2 +- modules/exploits/windows/ssh/sysax_ssh_username.rb | 2 +- 5 files changed, 10 insertions(+), 10 deletions(-) diff --git a/modules/auxiliary/scanner/afp/afp_server_info.rb b/modules/auxiliary/scanner/afp/afp_server_info.rb index 73e7024290..5e1196a029 100644 --- a/modules/auxiliary/scanner/afp/afp_server_info.rb +++ b/modules/auxiliary/scanner/afp/afp_server_info.rb @@ -17,9 +17,9 @@ class Metasploit3 < Msf::Auxiliary super(update_info(info, 'Name' => 'Apple Filing Protocol Info Enumerator', 'Description' => %q{ - This module fetch AFP server information. - Including Server name, network address, supported AFP versions, - signature, machine type ,and server flags. + This module fetches AFP server information, including server name, + network address, supported AFP versions, signature, machine type, + and server flags. }, 'References' => [ diff --git a/modules/auxiliary/scanner/mongodb/mongodb_login.rb b/modules/auxiliary/scanner/mongodb/mongodb_login.rb index 5243433fa7..50ac04ccb4 100644 --- a/modules/auxiliary/scanner/mongodb/mongodb_login.rb +++ b/modules/auxiliary/scanner/mongodb/mongodb_login.rb @@ -18,8 +18,8 @@ class Metasploit3 < Msf::Auxiliary super(update_info(info, 'Name' => 'MongoDB Login Utility', 'Description' => %q{ - This module scans for MongoDB server. By default MongoDB has no auth. If auth - is used, it is then possible to execute a brute force attack on the server. + This module attempts to brute force authentication credentials for MongoDB. + Note that, by default, MongoDB does not require authentication. }, 'References' => [ diff --git a/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb b/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb index 706085c3b3..84556eb6ab 100644 --- a/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb +++ b/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb @@ -17,9 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => "ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow", 'Description' => %q{ This module exploits a vulnerability found in ASUS Net4Switch's ipswcom.dll - ActiveX control. A buffer overflow condition is possible in multiple places all - because of the poor use of the CxDbgPrint() function, which allows remote attackers - to gain arbitrary code execution under the context of the user. + ActiveX control. A buffer overflow condition is possible in multiple places due + to the use of the CxDbgPrint() function, which allows remote attackers to gain + arbitrary code execution under the context of the user. }, 'License' => MSF_LICENSE, 'Author' => diff --git a/modules/exploits/windows/fileformat/ibm_pcm_ws.rb b/modules/exploits/windows/fileformat/ibm_pcm_ws.rb index c9d2df7808..9783c50a5b 100644 --- a/modules/exploits/windows/fileformat/ibm_pcm_ws.rb +++ b/modules/exploits/windows/fileformat/ibm_pcm_ws.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'IBM Personal Communications I-Series Access WorkStation 5.9 Profile', 'Description' => %q{ - The IBM Personal Communications I-Series application WorkStation is susceptible to a + The IBM Personal Communications I-Series application WorkStation is susceptible to a stack-based buffer overflow vulnerability within file parsing in which data copied to a location in memory exceeds the size of the reserved destination area. The buffer is located on the runtime program stack. diff --git a/modules/exploits/windows/ssh/sysax_ssh_username.rb b/modules/exploits/windows/ssh/sysax_ssh_username.rb index 772c65d11e..c4ed7f97ef 100644 --- a/modules/exploits/windows/ssh/sysax_ssh_username.rb +++ b/modules/exploits/windows/ssh/sysax_ssh_username.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a vulnerability found in Sysax's SSH service. By supplying a long username, the SSH server will copy that data on the stack - without any proper bounds checking, therefore allowing remote code execution + without proper bounds checking, therefore allowing remote code execution under the context of the user. Please note that previous versions (before 5.53) are also affected by this bug. },