Land #2746, weekly update grammer/caps fixup

bug/bundler_fix 4.8.2
Brandon Turner 2013-12-09 14:18:42 -06:00
commit 3b0a01e6dc
No known key found for this signature in database
GPG Key ID: 0F82931CA3EE1B07
5 changed files with 7 additions and 7 deletions

View File

@ -11,12 +11,12 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'Ruby-on-Rails Action View MIME Memory Exhaustion',
'Name' => 'Ruby on Rails Action View MIME Memory Exhaustion',
'Description' => %q{
This module exploits a Denial of Service (DoS) condition in Action View that requires
a controller action. By sending a specially crafted content-type header to a rails
a controller action. By sending a specially crafted content-type header to a Rails
application, it is possible for it to store the invalid MIME type, and may eventually
consumes all memory if enough invalid MIMEs are given.
consume all memory if enough invalid MIMEs are given.
Versions 3.0.0 and other later versions are affected, fixed in 4.0.2 and 3.2.16.
},

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => 'vBulletin Password Collector via nodeid SQL Injection',
'Description' => %q{
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has been
This module exploits a SQL injection vulnerability found in vBulletin 5 that has been
used in the wild since March 2013. This module can be used to extract the web application's
usernames and hashes, which could be used to authenticate into the vBulletin admin control
panel.

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection',
'Description' => %q{
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has
This module exploits a SQL injection vulnerability found in vBulletin 5 that has
been used in the wild since March 2013. This module uses the sqli to extract the
web application's usernames and hashes. With the retrieved information tries to
log into the admin control panel in order to deploy the PHP payload. This module

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
super( update_info( info,
'Name' => 'Windows Gather Skype, Firefox, and Chrome Artifacts',
'Description' => %q{
Gathers Skype chat logs, Firefox history, and Chrome history data from the victim machine.
Gathers Skype chat logs, Firefox history, and Chrome history data from the target machine.
},
'License' => MSF_LICENSE,
'Author' => [ 'Joshua Harper (@JonValt) <josh at radixtx dot com>' ],

View File

@ -11,7 +11,7 @@ class Metasploit4 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Testing Meterpreter ExtAPI Stuff',
'Name' => 'Test Meterpreter ExtAPI Stuff',
'Description' => %q{ This module will test Windows Extended API methods },
'License' => MSF_LICENSE,
'Author' => [ 'Ben Campbell'],