diff --git a/modules/exploits/multi/http/bassmaster_js_injection.rb b/modules/exploits/multi/http/bassmaster_js_injection.rb index f46ae7b64e..adefe65300 100644 --- a/modules/exploits/multi/http/bassmaster_js_injection.rb +++ b/modules/exploits/multi/http/bassmaster_js_injection.rb @@ -10,7 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Bassmaster batch Arbitrary JavaScript Injection Remote Code Execution', + 'Name' => 'Bassmaster Batch Arbitrary JavaScript Injection Remote Code Execution', 'Description' => %q{ This module exploits an un-authenticated code injection vulnerability in the bassmaster nodejs plugin for hapi. The vulnerability is within the batch endpoint and allows an @@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Author' => [ 'mr_me ', # msf - 'Jarda Kotěšovec' # original bug finder + 'Jarda Kotesovec' # original bug finder ], 'References' => [