From 5916a4afe3fbec67ba409fb73e5740ff95c14a7a Mon Sep 17 00:00:00 2001 From: HD Moore Date: Tue, 18 Oct 2011 09:56:33 +0000 Subject: [PATCH] Cosmetic git-svn-id: file:///home/svn/framework3/trunk@13991 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/unix/webapp/php_eval.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/unix/webapp/php_eval.rb b/modules/exploits/unix/webapp/php_eval.rb index 7d67c6248b..ecfeea6ca0 100644 --- a/modules/exploits/unix/webapp/php_eval.rb +++ b/modules/exploits/unix/webapp/php_eval.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Generic PHP Code eval', + 'Name' => 'Generic PHP Code Evaluation', 'Description' => %q{ Exploits things like It is likely that HTTP evasion options will break this exploit.