Module title normalization
Module titles should read like titles. For capitalization rules in English, see: http://owl.english.purdue.edu/owl/resource/592/01/ The only exceptions are function names (like 'thisFunc()') and specific filenames (like thisfile.ocx).unstable
parent
bce1c08623
commit
4a631e463c
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'PmWiki <= 2.2.34 (pagelist) Remote PHP Code Execution',
|
'Name' => 'PmWiki <= 2.2.34 pagelist.php Remote PHP Code Injection Exploit',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits an arbitrary command execution vulnerability
|
This module exploits an arbitrary command execution vulnerability
|
||||||
in PmWiki from 2.0.0 to 2.2.34. The vulnerable function is
|
in PmWiki from 2.0.0 to 2.2.34. The vulnerable function is
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'vBSEO <= 3.6.0 "proc_deutf()" Remote PHP Code Injection',
|
'Name' => 'vBSEO <= 3.6.0 proc_deutf() Remote PHP Code Injection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a vulnerability in the 'proc_deutf()' function
|
This module exploits a vulnerability in the 'proc_deutf()' function
|
||||||
defined in /includes/functions_vbseocp_abstract.php. User input passed through
|
defined in /includes/functions_vbseocp_abstract.php. User input passed through
|
||||||
|
|
|
@ -24,14 +24,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Mozilla Firefox 3.6.16 mChannel use after free vulnerability',
|
'Name' => 'Mozilla Firefox 3.6.16 mChannel Use-After-Free',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a use-after-free vulnerability in Mozilla
|
This module exploits a use-after-free vulnerability in Mozilla
|
||||||
Firefox 3.6.16. An OBJECT Element mChannel can be freed via the
|
Firefox 3.6.16. An OBJECT element, mChannel, can be freed via the
|
||||||
OnChannelRedirect method of the nsIChannelEventSink Interface. mChannel
|
OnChannelRedirect method of the nsIChannelEventSink Interface. mChannel
|
||||||
becomes a dangling pointer and can be reused when setting the OBJECTs
|
becomes a dangling pointer and can be reused when setting the OBJECTs
|
||||||
data attribute. (Discovered by regenrecht). Mac OS X version by argp,
|
data attribute. This module has been tested on Mac OS X 10.6.6, 10.6.7,
|
||||||
tested on Mac OS X 10.6.6, 10.6.7, 10.6.8, 10.7.2 and 10.7.3.
|
10.6.8, 10.7.2 and 10.7.3.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'CCMPlayer 1.5 Stack based Buffer Overflow (.m3u)',
|
'Name' => 'CCMPlayer 1.5 m3u Playlist Stack Based Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening
|
This module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening
|
||||||
a m3u playlist with a long track name, a SEH exception record can be overwritten
|
a m3u playlist with a long track name, a SEH exception record can be overwritten
|
||||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Free MP3 CD Ripper 1.1 (WAV File) Stack Buffer Overflow',
|
'Name' => 'Free MP3 CD Ripper 1.1 WAV File Stack Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a stack based buffer overflow found in Free MP3 CD
|
This module exploits a stack based buffer overflow found in Free MP3 CD
|
||||||
Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious
|
Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Mini-Stream RM-MP3 Converter v3.1.2.1 (PLS File) Stack Buffer Overflow',
|
'Name' => 'Mini-Stream RM-MP3 Converter v3.1.2.1 PLS File Stack Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a stack based buffer overflow found in Mini-Stream RM-MP3
|
This module exploits a stack based buffer overflow found in Mini-Stream RM-MP3
|
||||||
Converter v3.1.2.1. The overflow is triggered when an unsuspecting victim
|
Converter v3.1.2.1. The overflow is triggered when an unsuspecting victim
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'AbsoluteFTP 1.9.6 - 2.2.10 Remote Buffer Overflow (LIST)',
|
'Name' => 'AbsoluteFTP 1.9.6 - 2.2.10 LIST Command Remote Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits VanDyke Software AbsoluteFTP by overflowing
|
This module exploits VanDyke Software AbsoluteFTP by overflowing
|
||||||
a filename buffer related to the LIST command.
|
a filename buffer related to the LIST command.
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Serv-U FTP Server <4.2 Buffer Overflow',
|
'Name' => 'Serv-U FTP Server < 4.2 Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a stack buffer overflow in the site chmod command
|
This module exploits a stack buffer overflow in the site chmod command
|
||||||
in versions of Serv-U FTP Server prior to 4.2.
|
in versions of Serv-U FTP Server prior to 4.2.
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'StreamDown 6.8.0 Buffer overflow',
|
'Name' => 'StreamDown 6.8.0 Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
Stream Down 6.8.0 seh based buffer overflow triggered when processing
|
Stream Down 6.8.0 seh based buffer overflow triggered when processing
|
||||||
the server reponse packet.During the overflow a structured exception
|
the server reponse packet.During the overflow a structured exception
|
||||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => "Wireshark console.lua pre-loading vulnerability",
|
'Name' => "Wireshark console.lua Pre-Loading Script Execution",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This modules exploits a vulnerability in Wireshark 1.6 or less. When opening a
|
This modules exploits a vulnerability in Wireshark 1.6 or less. When opening a
|
||||||
pcap file, Wireshark will actually check if there's a 'console.lua' file in the same
|
pcap file, Wireshark will actually check if there's a 'console.lua' file in the same
|
||||||
|
@ -335,4 +335,4 @@ But on a fully patched XP SP3, the same URI format will not work. Windows will t
|
||||||
the share via SMB, and the victim will not see the share. In this case, you should specify
|
the share via SMB, and the victim will not see the share. In this case, you should specify
|
||||||
the URI to like this:
|
the URI to like this:
|
||||||
http://192.168.1.11/files
|
http://192.168.1.11/files
|
||||||
=end
|
=end
|
||||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows Gather RazorSQL credentials',
|
'Name' => 'Windows Gather RazorSQL Credentials',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module stores username, password, type, host, port, database (and name)
|
This module stores username, password, type, host, port, database (and name)
|
||||||
collected from profiles.txt of RazorSQL.
|
collected from profiles.txt of RazorSQL.
|
||||||
|
@ -154,4 +154,4 @@ end
|
||||||
=begin
|
=begin
|
||||||
http://www.razorsql.com/download.html
|
http://www.razorsql.com/download.html
|
||||||
Tested on: v5.6.2 (win32)
|
Tested on: v5.6.2 (win32)
|
||||||
=end
|
=end
|
||||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows Disconnect Wireless Connection ',
|
'Name' => 'Windows Disconnect Wireless Connection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module disconnects the current wireless network connection
|
This module disconnects the current wireless network connection
|
||||||
on the specified interface.
|
on the specified interface.
|
||||||
|
|
Loading…
Reference in New Issue