Land #4011, module description cleanup
commit
972efd423c
|
@ -19,8 +19,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(
|
||||
'Name' => 'HP Operations Manager Perfd Environment Scanner',
|
||||
'Description' => %q{
|
||||
This module will enumerate the environment
|
||||
HP Operation Manager via daemon perfd.
|
||||
This module will enumerate the process list of a remote machine by abusing
|
||||
HP Operation Manager's unauthenticated 'perfd' daemon.
|
||||
},
|
||||
'Author' => [ 'Roberto Soares Espreto <robertoespreto[at]gmail.com>' ],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Jenkins-CI Login Utility',
|
||||
'Description' => 'This module simply attempts to login to a Jenkins-CI instance using a specific user/pass.',
|
||||
'Description' => 'This module attempts to login to a Jenkins-CI instance using a specific user/pass.',
|
||||
'Author' => [ 'Nicholas Starke <starke.nicholas[at]gmail.com>' ],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
@ -67,7 +67,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
print_good "#{ip}:#{rport} - LOGIN SUCCESSFUL: #{result.credential}"
|
||||
else
|
||||
invalidate_login(credential_data)
|
||||
print_status "#{ip}:#{rport} - LOGIN FAILED: #{result.credential} (#{result.status})"
|
||||
vprint_status "#{ip}:#{rport} - LOGIN FAILED: #{result.credential} (#{result.status})"
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Wordpress InfusionSoft Upload Vulnerability',
|
||||
'Description' => %q{
|
||||
This module exploits an arbitrary PHP code upload in the wordpress Infusionsoft Gravity
|
||||
This module exploits an arbitrary PHP code upload in the WordPress Infusionsoft Gravity
|
||||
Forms plugin, versions from 1.5.3 to 1.5.10. The vulnerability allows for arbitrary file
|
||||
upload and remote code execution.
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => "Rejetto HttpFileServer Remote Command Execution",
|
||||
'Description' => %q{
|
||||
Rejetto HttpFileServer (HFS) is vulnerable to remote command execution attack due to a
|
||||
poor regex in the file ParserLib.pas. This module exploit the HFS scripting commands by
|
||||
poor regex in the file ParserLib.pas. This module exploits the HFS scripting commands by
|
||||
using '%00' to bypass the filtering. This module has been tested successfully on HFS 2.3b
|
||||
over Windows XP SP3, Windows 7 SP1 and Windows 8.
|
||||
},
|
||||
|
|
Loading…
Reference in New Issue