diff --git a/modules/exploits/unix/webapp/instantcms_exec.rb b/modules/exploits/unix/webapp/instantcms_exec.rb index a59febb253..d9ceb164c3 100755 --- a/modules/exploits/unix/webapp/instantcms_exec.rb +++ b/modules/exploits/unix/webapp/instantcms_exec.rb @@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'InstantCMS 1.6 Remote PHP Code Execution', 'Description' => %q{ - This module exploits an arbitrary php command execution vulnerability, because of a - dangerous use of eval(), in InstantCMS versions 1.6. + This module exploits an arbitrary PHP command execution vulnerability because of a + dangerous use of eval() in InstantCMS in versions 1.6 and prior. }, 'Author' => [ diff --git a/modules/exploits/windows/fileformat/abbs_amp_lst.rb b/modules/exploits/windows/fileformat/abbs_amp_lst.rb index 64930cdd7b..ccf9384b5a 100644 --- a/modules/exploits/windows/fileformat/abbs_amp_lst.rb +++ b/modules/exploits/windows/fileformat/abbs_amp_lst.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'ABBS Audio Media Player .LST Buffer Overflow', 'Description' => %q{ This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability - occurs when adding an .lst, allowing arbitrary code execution with the privileges + occurs when adding a specially crafted .lst file, allowing arbitrary code execution with the privileges of the user running the application . This module has been tested successfully on ABBS Audio Media Player 3.1 over Windows XP SP3 and Windows 7 SP1. },