diff --git a/modules/exploits/multi/browser/adobe_flash_nellymoser_bof.rb b/modules/exploits/multi/browser/adobe_flash_nellymoser_bof.rb index 9f7824d750..dcb5f9346a 100644 --- a/modules/exploits/multi/browser/adobe_flash_nellymoser_bof.rb +++ b/modules/exploits/multi/browser/adobe_flash_nellymoser_bof.rb @@ -20,9 +20,13 @@ class Metasploit3 < Msf::Exploit::Remote Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.160, Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.160, - Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160, and - Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466. + Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160, + Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466, and Ubuntu 14.04.2 LTS, Firefox 35.01, and Adobe Flash 11.2.202.466. + + Note that this exploit is effective against both CVE-2015-3113 and the + earlier CVE-2015-3043, since CVE-2015-3113 is effectively a regression + to the same root cause as CVE-2015-3043. }, 'License' => MSF_LICENSE, 'Author' => diff --git a/modules/post/windows/gather/credentials/enum_laps.rb b/modules/post/windows/gather/credentials/enum_laps.rb index ccbe8dc996..32727cbd1e 100644 --- a/modules/post/windows/gather/credentials/enum_laps.rb +++ b/modules/post/windows/gather/credentials/enum_laps.rb @@ -22,9 +22,9 @@ class Metasploit3 < Msf::Post 'Name' => 'Windows Gather Credentials Local Administrator Password Solution', 'Description' => %Q{ This module will recover the LAPS (Local Administrator Password Solution) passwords, - configured in active directory. Note, only privileged users should be able to access - these fields. Note: The local administrator account name is not stored in active directory, - so we assume that this will be 'Administrator' by default. + configured in Active Directory, which is usually only accessible by privileged users. + Note that the local administrator account name is not stored in Active Directory, + so it is assumed to be 'Administrator' by default. }, 'License' => MSF_LICENSE, 'Author' => diff --git a/modules/post/windows/gather/enum_ad_bitlocker.rb b/modules/post/windows/gather/enum_ad_bitlocker.rb index b2aa320180..c72c4981d0 100644 --- a/modules/post/windows/gather/enum_ad_bitlocker.rb +++ b/modules/post/windows/gather/enum_ad_bitlocker.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post 'Name' => 'Windows Gather Active Directory BitLocker Recovery', 'Description' => %q{ This module will enumerate BitLocker recovery passwords in the default AD - directory. Requires Domain Admin or other delegated privileges. + directory. This module does require Domain Admin or other delegated privileges. }, 'License' => MSF_LICENSE, 'Author' => ['Ben Campbell '],