Module title normalization

Module titles should read like titles. For
capitalization rules in English, see:
http://owl.english.purdue.edu/owl/resource/592/01/

The only exceptions are function names (like 'thisFunc()') and specific
filenames (like thisfile.ocx).
unstable
Tod Beardsley 2012-02-21 11:03:18 -06:00
parent bce1c08623
commit 4a631e463c
12 changed files with 17 additions and 17 deletions

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => 'PmWiki <= 2.2.34 (pagelist) Remote PHP Code Execution', 'Name' => 'PmWiki <= 2.2.34 pagelist.php Remote PHP Code Injection Exploit',
'Description' => %q{ 'Description' => %q{
This module exploits an arbitrary command execution vulnerability This module exploits an arbitrary command execution vulnerability
in PmWiki from 2.0.0 to 2.2.34. The vulnerable function is in PmWiki from 2.0.0 to 2.2.34. The vulnerable function is

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'vBSEO <= 3.6.0 "proc_deutf()" Remote PHP Code Injection', 'Name' => 'vBSEO <= 3.6.0 proc_deutf() Remote PHP Code Injection',
'Description' => %q{ 'Description' => %q{
This module exploits a vulnerability in the 'proc_deutf()' function This module exploits a vulnerability in the 'proc_deutf()' function
defined in /includes/functions_vbseocp_abstract.php. User input passed through defined in /includes/functions_vbseocp_abstract.php. User input passed through

View File

@ -24,14 +24,14 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Mozilla Firefox 3.6.16 mChannel use after free vulnerability', 'Name' => 'Mozilla Firefox 3.6.16 mChannel Use-After-Free',
'Description' => %q{ 'Description' => %q{
This module exploits a use-after-free vulnerability in Mozilla This module exploits a use-after-free vulnerability in Mozilla
Firefox 3.6.16. An OBJECT Element mChannel can be freed via the Firefox 3.6.16. An OBJECT element, mChannel, can be freed via the
OnChannelRedirect method of the nsIChannelEventSink Interface. mChannel OnChannelRedirect method of the nsIChannelEventSink Interface. mChannel
becomes a dangling pointer and can be reused when setting the OBJECTs becomes a dangling pointer and can be reused when setting the OBJECTs
data attribute. (Discovered by regenrecht). Mac OS X version by argp, data attribute. This module has been tested on Mac OS X 10.6.6, 10.6.7,
tested on Mac OS X 10.6.6, 10.6.7, 10.6.8, 10.7.2 and 10.7.3. 10.6.8, 10.7.2 and 10.7.3.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'CCMPlayer 1.5 Stack based Buffer Overflow (.m3u)', 'Name' => 'CCMPlayer 1.5 m3u Playlist Stack Based Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening This module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening
a m3u playlist with a long track name, a SEH exception record can be overwritten a m3u playlist with a long track name, a SEH exception record can be overwritten

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Free MP3 CD Ripper 1.1 (WAV File) Stack Buffer Overflow', 'Name' => 'Free MP3 CD Ripper 1.1 WAV File Stack Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack based buffer overflow found in Free MP3 CD This module exploits a stack based buffer overflow found in Free MP3 CD
Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Mini-Stream RM-MP3 Converter v3.1.2.1 (PLS File) Stack Buffer Overflow', 'Name' => 'Mini-Stream RM-MP3 Converter v3.1.2.1 PLS File Stack Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack based buffer overflow found in Mini-Stream RM-MP3 This module exploits a stack based buffer overflow found in Mini-Stream RM-MP3
Converter v3.1.2.1. The overflow is triggered when an unsuspecting victim Converter v3.1.2.1. The overflow is triggered when an unsuspecting victim

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'AbsoluteFTP 1.9.6 - 2.2.10 Remote Buffer Overflow (LIST)', 'Name' => 'AbsoluteFTP 1.9.6 - 2.2.10 LIST Command Remote Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits VanDyke Software AbsoluteFTP by overflowing This module exploits VanDyke Software AbsoluteFTP by overflowing
a filename buffer related to the LIST command. a filename buffer related to the LIST command.

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Serv-U FTP Server <4.2 Buffer Overflow', 'Name' => 'Serv-U FTP Server < 4.2 Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack buffer overflow in the site chmod command This module exploits a stack buffer overflow in the site chmod command
in versions of Serv-U FTP Server prior to 4.2. in versions of Serv-U FTP Server prior to 4.2.

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'StreamDown 6.8.0 Buffer overflow', 'Name' => 'StreamDown 6.8.0 Buffer Overflow',
'Description' => %q{ 'Description' => %q{
Stream Down 6.8.0 seh based buffer overflow triggered when processing Stream Down 6.8.0 seh based buffer overflow triggered when processing
the server reponse packet.During the overflow a structured exception the server reponse packet.During the overflow a structured exception

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => "Wireshark console.lua pre-loading vulnerability", 'Name' => "Wireshark console.lua Pre-Loading Script Execution",
'Description' => %q{ 'Description' => %q{
This modules exploits a vulnerability in Wireshark 1.6 or less. When opening a This modules exploits a vulnerability in Wireshark 1.6 or less. When opening a
pcap file, Wireshark will actually check if there's a 'console.lua' file in the same pcap file, Wireshark will actually check if there's a 'console.lua' file in the same
@ -335,4 +335,4 @@ But on a fully patched XP SP3, the same URI format will not work. Windows will t
the share via SMB, and the victim will not see the share. In this case, you should specify the share via SMB, and the victim will not see the share. In this case, you should specify
the URI to like this: the URI to like this:
http://192.168.1.11/files http://192.168.1.11/files
=end =end

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Gather RazorSQL credentials', 'Name' => 'Windows Gather RazorSQL Credentials',
'Description' => %q{ 'Description' => %q{
This module stores username, password, type, host, port, database (and name) This module stores username, password, type, host, port, database (and name)
collected from profiles.txt of RazorSQL. collected from profiles.txt of RazorSQL.
@ -154,4 +154,4 @@ end
=begin =begin
http://www.razorsql.com/download.html http://www.razorsql.com/download.html
Tested on: v5.6.2 (win32) Tested on: v5.6.2 (win32)
=end =end

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Disconnect Wireless Connection ', 'Name' => 'Windows Disconnect Wireless Connection',
'Description' => %q{ 'Description' => %q{
This module disconnects the current wireless network connection This module disconnects the current wireless network connection
on the specified interface. on the specified interface.