Minor description changes on new modules
parent
0acdc32bac
commit
8d7396d60a
|
@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'InstantCMS 1.6 Remote PHP Code Execution',
|
||||
'Description' => %q{
|
||||
This module exploits an arbitrary php command execution vulnerability, because of a
|
||||
dangerous use of eval(), in InstantCMS versions 1.6.
|
||||
This module exploits an arbitrary PHP command execution vulnerability because of a
|
||||
dangerous use of eval() in InstantCMS in versions 1.6 and prior.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'ABBS Audio Media Player .LST Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability
|
||||
occurs when adding an .lst, allowing arbitrary code execution with the privileges
|
||||
occurs when adding a specially crafted .lst file, allowing arbitrary code execution with the privileges
|
||||
of the user running the application . This module has been tested successfully on
|
||||
ABBS Audio Media Player 3.1 over Windows XP SP3 and Windows 7 SP1.
|
||||
},
|
||||
|
|
Loading…
Reference in New Issue