style compliance fixes

git-svn-id: file:///home/svn/framework3/trunk@9893 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-07-20 23:28:47 +00:00
parent 7a38599cea
commit 1ca054ba53
2 changed files with 3 additions and 3 deletions

View File

@ -55,7 +55,7 @@ class Metasploit3 < Msf::Auxiliary
if (res.headers['Set-Cookie'] and res.headers['Set-Cookie'].match(/PHPSESSID=(.*);(.*)/i))
sessionid = res.headers['Set-Cookie'].split(';')[0]
print_status("Sending command: #{datastore['CMD']}...")
send_request_cgi(

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Microsoft OWC Spreadsheet msDataSourceObject Memory Corruption',
'Description' => %q{
This module exploits a memory corruption vulnerability within versions 10 and 11 of
the Office Web Component Spreadsheet ActiveX control. This module was based on
the Office Web Component Spreadsheet ActiveX control. This module was based on
an exploit found in the wild.
},
'License' => MSF_LICENSE,
@ -97,7 +97,7 @@ try {
xobj = new ActiveXObject("OWC10.Spreadsheet");
} catch(err) {
try {
xobj = new ActiveXObject("OWC11.Spreadsheet");
xobj = new ActiveXObject("OWC11.Spreadsheet");
} catch(err) {
}
}