Land #2746, weekly update grammer/caps fixup

bug/bundler_fix 4.8.2
Brandon Turner 2013-12-09 14:18:42 -06:00
commit 3b0a01e6dc
No known key found for this signature in database
GPG Key ID: 0F82931CA3EE1B07
5 changed files with 7 additions and 7 deletions

View File

@ -11,12 +11,12 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Ruby-on-Rails Action View MIME Memory Exhaustion', 'Name' => 'Ruby on Rails Action View MIME Memory Exhaustion',
'Description' => %q{ 'Description' => %q{
This module exploits a Denial of Service (DoS) condition in Action View that requires This module exploits a Denial of Service (DoS) condition in Action View that requires
a controller action. By sending a specially crafted content-type header to a rails a controller action. By sending a specially crafted content-type header to a Rails
application, it is possible for it to store the invalid MIME type, and may eventually application, it is possible for it to store the invalid MIME type, and may eventually
consumes all memory if enough invalid MIMEs are given. consume all memory if enough invalid MIMEs are given.
Versions 3.0.0 and other later versions are affected, fixed in 4.0.2 and 3.2.16. Versions 3.0.0 and other later versions are affected, fixed in 4.0.2 and 3.2.16.
}, },

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info, super(update_info(info,
'Name' => 'vBulletin Password Collector via nodeid SQL Injection', 'Name' => 'vBulletin Password Collector via nodeid SQL Injection',
'Description' => %q{ 'Description' => %q{
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has been This module exploits a SQL injection vulnerability found in vBulletin 5 that has been
used in the wild since March 2013. This module can be used to extract the web application's used in the wild since March 2013. This module can be used to extract the web application's
usernames and hashes, which could be used to authenticate into the vBulletin admin control usernames and hashes, which could be used to authenticate into the vBulletin admin control
panel. panel.

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => 'vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection', 'Name' => 'vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection',
'Description' => %q{ 'Description' => %q{
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has This module exploits a SQL injection vulnerability found in vBulletin 5 that has
been used in the wild since March 2013. This module uses the sqli to extract the been used in the wild since March 2013. This module uses the sqli to extract the
web application's usernames and hashes. With the retrieved information tries to web application's usernames and hashes. With the retrieved information tries to
log into the admin control panel in order to deploy the PHP payload. This module log into the admin control panel in order to deploy the PHP payload. This module

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
super( update_info( info, super( update_info( info,
'Name' => 'Windows Gather Skype, Firefox, and Chrome Artifacts', 'Name' => 'Windows Gather Skype, Firefox, and Chrome Artifacts',
'Description' => %q{ 'Description' => %q{
Gathers Skype chat logs, Firefox history, and Chrome history data from the victim machine. Gathers Skype chat logs, Firefox history, and Chrome history data from the target machine.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Joshua Harper (@JonValt) <josh at radixtx dot com>' ], 'Author' => [ 'Joshua Harper (@JonValt) <josh at radixtx dot com>' ],

View File

@ -11,7 +11,7 @@ class Metasploit4 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Testing Meterpreter ExtAPI Stuff', 'Name' => 'Test Meterpreter ExtAPI Stuff',
'Description' => %q{ This module will test Windows Extended API methods }, 'Description' => %q{ This module will test Windows Extended API methods },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Ben Campbell'], 'Author' => [ 'Ben Campbell'],