Land #2869, pre-release title/desc fixes

bug/bundler_fix
William Vu 2014-01-13 14:29:27 -06:00
commit 61b30e8b60
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
6 changed files with 11 additions and 11 deletions

View File

@ -33,8 +33,8 @@ class Metasploit3 < Msf::Auxiliary
'Name' => "SerComm Device Configuration Dump",
'Description' => %q{
This module will dump the configuration of several SerComm devices. These devices
typically include routers from NetGear and Linksys. This module has been tested
successfully on
typically include routers from NetGear and Linksys. This module was tested
successfully against the NetGear DG834 series ADSL modem router.
},
'License' => MSF_LICENSE,
'Author' =>

View File

@ -17,7 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module will cause remote code execution on several SerComm devices.
These devices typically include routers from NetGear and Linksys.
Tested against NetGear DG834.
This module was tested successfully against the NetGear DG834 series
ADSL modem router.
},
'License' => MSF_LICENSE,
'Author' =>

View File

@ -12,12 +12,11 @@ module Metasploit3
def initialize(info={})
super(merge_info(info,
'Name' => 'Firefox XPCOM execute command',
'Name' => 'Firefox XPCOM Execute Command',
'Description' => %Q|
Runs a shell command on the OS. Never touches the disk.
This module runs a shell command on the target OS withough touching the disk.
On Windows, this command will flash the command prompt momentarily.
You can avoid this by setting WSCRIPT to true, which drops a jscript
This can be avoided by setting WSCRIPT to true, which drops a jscript
"launcher" to disk that hides the prompt.
|,
'Author' => ['joev'],

View File

@ -16,7 +16,7 @@ module Metasploit3
def initialize(info = {})
super(merge_info(info,
'Name' => 'Command Shell, Bind TCP (via Firefox XPCOM script)',
'Description' => 'Creates an interactive shell via Javascript with access to Firefox\'s XPCOM API',
'Description' => %q{Creates an interactive shell via Javascript with access to Firefox's XPCOM API},
'Author' => ['joev'],
'License' => BSD_LICENSE,
'Platform' => 'firefox',

View File

@ -16,7 +16,7 @@ module Metasploit3
def initialize(info={})
super(merge_info(info,
'Name' => 'Command Shell, Reverse TCP (via Firefox XPCOM script)',
'Description' => 'Creates an interactive shell via Javascript with access to Firefox\'s XPCOM API',
'Description' => %q{Creates an interactive shell via Javascript with access to Firefox's XPCOM API},
'Author' => ['joev'],
'License' => BSD_LICENSE,
'Platform' => 'firefox',

View File

@ -16,8 +16,8 @@ class Metasploit3 < Msf::Post
'Name' => 'Firefox XSS',
'Description' => %q{
This module runs the provided SCRIPT as javascript in the
origin of the provided URL. It works by navigating a hidden
ChromeWindow to the URL, then injecting the SCRIPT with Function.
origin of the provided URL. It works by navigating to a hidden
ChromeWindow to the URL, then injecting the SCRIPT with Function().
The callback "send(result)" is used to send data back to the listener.
},
'License' => MSF_LICENSE,