Update for grammar in descriptions on new modules.
parent
5b4890f5b9
commit
6b15a079ea
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
super(update_info(info,
|
||||
'Name' => 'Mac OS X Sudo Password Bypass',
|
||||
'Description' => %q{
|
||||
Gains a session with root permissions on versions of OS X with
|
||||
This module gains a session with root permissions on versions of OS X with
|
||||
sudo binary vulnerable to CVE-2013-1775. Tested working on Mac OS 10.7-10.8.4,
|
||||
and possibly lower versions.
|
||||
|
||||
|
@ -39,8 +39,8 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
user has ever run the "sudo" command, it is possible to become the super
|
||||
user by running `sudo -k` and then resetting the system clock to 01-01-1970.
|
||||
|
||||
Fails silently if the user is not an admin or if the user has never
|
||||
ran the sudo command.
|
||||
This module will fail silently if the user is not an admin or if the user has never
|
||||
run the sudo command.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a remote code execution vulnerability in the pickle
|
||||
handling of the rendering code in the Graphite Web project between version
|
||||
0.9.5 and 0.9.10(both included).
|
||||
0.9.5 and 0.9.10 (both included).
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
@ -77,4 +77,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'data' => data
|
||||
})
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
This module exploits a command injection vulnerability on the Oracle Endeca
|
||||
Server 7.4.0. The vulnerability exists on the createDataStore method from the
|
||||
controlSoapBinding web service. The vulnerable method only exists on the 7.4.0
|
||||
branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection
|
||||
branch and isn't available on the 7.5.5.1 branch. In addition, the injection
|
||||
has been found to be Windows specific. This module has been tested successfully
|
||||
on Endeca Server 7.4.0.787 over Windows 2008 R2 (64 bits).
|
||||
},
|
||||
|
|
Loading…
Reference in New Issue