diff --git a/modules/exploits/osx/local/sudo_password_bypass.rb b/modules/exploits/osx/local/sudo_password_bypass.rb index f56ed775d7..ccea3a84f1 100644 --- a/modules/exploits/osx/local/sudo_password_bypass.rb +++ b/modules/exploits/osx/local/sudo_password_bypass.rb @@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Local super(update_info(info, 'Name' => 'Mac OS X Sudo Password Bypass', 'Description' => %q{ - Gains a session with root permissions on versions of OS X with + This module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775. Tested working on Mac OS 10.7-10.8.4, and possibly lower versions. @@ -39,8 +39,8 @@ class Metasploit3 < Msf::Exploit::Local user has ever run the "sudo" command, it is possible to become the super user by running `sudo -k` and then resetting the system clock to 01-01-1970. - Fails silently if the user is not an admin or if the user has never - ran the sudo command. + This module will fail silently if the user is not an admin or if the user has never + run the sudo command. }, 'License' => MSF_LICENSE, 'Author' => diff --git a/modules/exploits/unix/webapp/graphite_pickle_exec.rb b/modules/exploits/unix/webapp/graphite_pickle_exec.rb index e91da282a8..2925b24c24 100644 --- a/modules/exploits/unix/webapp/graphite_pickle_exec.rb +++ b/modules/exploits/unix/webapp/graphite_pickle_exec.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a remote code execution vulnerability in the pickle handling of the rendering code in the Graphite Web project between version - 0.9.5 and 0.9.10(both included). + 0.9.5 and 0.9.10 (both included). }, 'Author' => [ @@ -77,4 +77,4 @@ class Metasploit3 < Msf::Exploit::Remote 'data' => data }) end -end \ No newline at end of file +end diff --git a/modules/exploits/windows/http/oracle_endeca_exec.rb b/modules/exploits/windows/http/oracle_endeca_exec.rb index e30b0b61bf..ffe4936f32 100644 --- a/modules/exploits/windows/http/oracle_endeca_exec.rb +++ b/modules/exploits/windows/http/oracle_endeca_exec.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a command injection vulnerability on the Oracle Endeca Server 7.4.0. The vulnerability exists on the createDataStore method from the controlSoapBinding web service. The vulnerable method only exists on the 7.4.0 - branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection + branch and isn't available on the 7.5.5.1 branch. In addition, the injection has been found to be Windows specific. This module has been tested successfully on Endeca Server 7.4.0.787 over Windows 2008 R2 (64 bits). },