Slight fixes to grammar/desc/whitespace
Note that the format_all_drives module had a pile of CRLFs that should have been caught by msftidy. Not sure why it didn't.bug/bundler_fix
parent
8f2e444aca
commit
79f2708a6e
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(update_info(info,
|
||||
'Name' => 'Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration',
|
||||
'Description' => %q{
|
||||
This module can be used to brute force RIDs associated with the domain of the SQL Server
|
||||
This module can be used to bruteforce RIDs associated with the domain of the SQL Server
|
||||
using the SUSER_SNAME function. This is similar to the smb_lookupsid module, but executed
|
||||
through SQL Server queries as any user with the PUBLIC role (everyone). Information that
|
||||
can be enumerated includes Windows domain users, groups, and computer accounts. Enumerated
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(update_info(info,
|
||||
'Name' => 'Microsoft SQL Server - SQLi SUSER_SNAME Domain Account Enumeration',
|
||||
'Description' => %q{
|
||||
This module can be used to brute force RIDs associated with the domain of the SQL Server
|
||||
This module can be used to bruteforce RIDs associated with the domain of the SQL Server
|
||||
using the SUSER_SNAME function via Error Based SQL injection. This is similar to the
|
||||
smb_lookupsid module, but executed through SQL Server queries as any user with the PUBLIC
|
||||
role (everyone). Information that can be enumerated includes Windows domain users, groups,
|
||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => 'Pandora FMS SQLi Remote Code Execution',
|
||||
'Name' => 'Pandora FMS Default Credential / SQLi Remote Code Execution',
|
||||
'Description' => %q{
|
||||
This module attempts to exploit multiple issues in order to gain remote
|
||||
code execution under Pandora FMS version <= 5.0 SP2. First, an attempt
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
|
||||
Tested on Mavericks 10.9.5, and should work on previous versions.
|
||||
|
||||
The issue has been patched silently in Yosemite.
|
||||
The issue was patched silently in Yosemite.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
|
@ -27,10 +27,11 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => "Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution",
|
||||
'Description' => %q{
|
||||
This module exploits Windows OLE Automation Array Vulnerability known as CVE-2014-6332.
|
||||
This module exploits the Windows OLE Automation array vulnerability, CVE-2014-6332.
|
||||
The vulnerability affects Internet Explorer 3.0 until version 11 within Windows95 up to Windows 10.
|
||||
Powershell is required on the target machine. On Internet Explorer versions using Protected Mode,
|
||||
the user has to manually allow powershell.exe to execute in order to be compromised.
|
||||
For this module to be successful, powershell is required on the target machine. On
|
||||
Internet Explorer versions using Protected Mode, the user has to manually allow
|
||||
powershell.exe to execute in order to be compromised.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
|
@ -25,15 +25,11 @@ module Metasploit3
|
|||
super(update_info(info,
|
||||
'Name' => 'Windows Drive Formatter',
|
||||
'Description' => %q{
|
||||
This payload formats all mounted disks in
|
||||
Windows (aka ShellcodeOfDeath).
|
||||
This payload formats all mounted disks in Windows (aka ShellcodeOfDeath).
|
||||
|
||||
After formatting, this payload sets the
|
||||
volume label to the string specified in
|
||||
the VOLUMELABEL option. If the code is
|
||||
unable to access a drive for any reason,
|
||||
it skips the drive and proceeds to the
|
||||
next volume.
|
||||
After formatting, this payload sets the volume label to the string specified in
|
||||
the VOLUMELABEL option. If the code is unable to access a drive for any reason,
|
||||
it skips the drive and proceeds to the next volume.
|
||||
},
|
||||
'Author' => [ 'Ashfaq Ansari <ashfaq_ansari1989[at]hotmail.com>',
|
||||
'Ruei-Min Jiang <mike820324[at]gmail.com>'
|
||||
|
|
Loading…
Reference in New Issue