Module title normalization
Module titles should read like titles. For capitalization rules in English, see: http://owl.english.purdue.edu/owl/resource/592/01/ The only exceptions are function names (like 'thisFunc()') and specific filenames (like thisfile.ocx).unstable
parent
bce1c08623
commit
4a631e463c
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => 'PmWiki <= 2.2.34 (pagelist) Remote PHP Code Execution',
|
||||
'Name' => 'PmWiki <= 2.2.34 pagelist.php Remote PHP Code Injection Exploit',
|
||||
'Description' => %q{
|
||||
This module exploits an arbitrary command execution vulnerability
|
||||
in PmWiki from 2.0.0 to 2.2.34. The vulnerable function is
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'vBSEO <= 3.6.0 "proc_deutf()" Remote PHP Code Injection',
|
||||
'Name' => 'vBSEO <= 3.6.0 proc_deutf() Remote PHP Code Injection',
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability in the 'proc_deutf()' function
|
||||
defined in /includes/functions_vbseocp_abstract.php. User input passed through
|
||||
|
|
|
@ -24,14 +24,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Mozilla Firefox 3.6.16 mChannel use after free vulnerability',
|
||||
'Name' => 'Mozilla Firefox 3.6.16 mChannel Use-After-Free',
|
||||
'Description' => %q{
|
||||
This module exploits a use-after-free vulnerability in Mozilla
|
||||
Firefox 3.6.16. An OBJECT Element mChannel can be freed via the
|
||||
Firefox 3.6.16. An OBJECT element, mChannel, can be freed via the
|
||||
OnChannelRedirect method of the nsIChannelEventSink Interface. mChannel
|
||||
becomes a dangling pointer and can be reused when setting the OBJECTs
|
||||
data attribute. (Discovered by regenrecht). Mac OS X version by argp,
|
||||
tested on Mac OS X 10.6.6, 10.6.7, 10.6.8, 10.7.2 and 10.7.3.
|
||||
data attribute. This module has been tested on Mac OS X 10.6.6, 10.6.7,
|
||||
10.6.8, 10.7.2 and 10.7.3.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'CCMPlayer 1.5 Stack based Buffer Overflow (.m3u)',
|
||||
'Name' => 'CCMPlayer 1.5 m3u Playlist Stack Based Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening
|
||||
a m3u playlist with a long track name, a SEH exception record can be overwritten
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Free MP3 CD Ripper 1.1 (WAV File) Stack Buffer Overflow',
|
||||
'Name' => 'Free MP3 CD Ripper 1.1 WAV File Stack Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack based buffer overflow found in Free MP3 CD
|
||||
Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Mini-Stream RM-MP3 Converter v3.1.2.1 (PLS File) Stack Buffer Overflow',
|
||||
'Name' => 'Mini-Stream RM-MP3 Converter v3.1.2.1 PLS File Stack Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack based buffer overflow found in Mini-Stream RM-MP3
|
||||
Converter v3.1.2.1. The overflow is triggered when an unsuspecting victim
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'AbsoluteFTP 1.9.6 - 2.2.10 Remote Buffer Overflow (LIST)',
|
||||
'Name' => 'AbsoluteFTP 1.9.6 - 2.2.10 LIST Command Remote Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits VanDyke Software AbsoluteFTP by overflowing
|
||||
a filename buffer related to the LIST command.
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Serv-U FTP Server <4.2 Buffer Overflow',
|
||||
'Name' => 'Serv-U FTP Server < 4.2 Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in the site chmod command
|
||||
in versions of Serv-U FTP Server prior to 4.2.
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'StreamDown 6.8.0 Buffer overflow',
|
||||
'Name' => 'StreamDown 6.8.0 Buffer Overflow',
|
||||
'Description' => %q{
|
||||
Stream Down 6.8.0 seh based buffer overflow triggered when processing
|
||||
the server reponse packet.During the overflow a structured exception
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "Wireshark console.lua pre-loading vulnerability",
|
||||
'Name' => "Wireshark console.lua Pre-Loading Script Execution",
|
||||
'Description' => %q{
|
||||
This modules exploits a vulnerability in Wireshark 1.6 or less. When opening a
|
||||
pcap file, Wireshark will actually check if there's a 'console.lua' file in the same
|
||||
|
@ -335,4 +335,4 @@ But on a fully patched XP SP3, the same URI format will not work. Windows will t
|
|||
the share via SMB, and the victim will not see the share. In this case, you should specify
|
||||
the URI to like this:
|
||||
http://192.168.1.11/files
|
||||
=end
|
||||
=end
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Gather RazorSQL credentials',
|
||||
'Name' => 'Windows Gather RazorSQL Credentials',
|
||||
'Description' => %q{
|
||||
This module stores username, password, type, host, port, database (and name)
|
||||
collected from profiles.txt of RazorSQL.
|
||||
|
@ -154,4 +154,4 @@ end
|
|||
=begin
|
||||
http://www.razorsql.com/download.html
|
||||
Tested on: v5.6.2 (win32)
|
||||
=end
|
||||
=end
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Disconnect Wireless Connection ',
|
||||
'Name' => 'Windows Disconnect Wireless Connection',
|
||||
'Description' => %q{
|
||||
This module disconnects the current wireless network connection
|
||||
on the specified interface.
|
||||
|
|
Loading…
Reference in New Issue