From 2afc90a8ded6d92e6609e1211ee2c87a5552a203 Mon Sep 17 00:00:00 2001 From: Steve Tornio Date: Tue, 18 Jun 2013 06:05:45 -0500 Subject: [PATCH] fix typos --- modules/exploits/multi/http/polarcms_upload_exec.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/http/polarcms_upload_exec.rb b/modules/exploits/multi/http/polarcms_upload_exec.rb index ca21936976..6febcde64e 100644 --- a/modules/exploits/multi/http/polarcms_upload_exec.rb +++ b/modules/exploits/multi/http/polarcms_upload_exec.rb @@ -17,9 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'PolarPearCms PHP File Upload Vulnerability', + 'Name' => 'PolarBear CMS PHP File Upload Vulnerability', 'Description' => %q{ - This module exploits a file upload vulnerability found in PlarPear CMS + This module exploits a file upload vulnerability found in PolarBear CMS By abusing the upload.php file, a malicious user can upload a file to a temp directory without authentication, which results in arbitrary code execution. },