From 9ce2dd981558322917d0dd747dd5f396b663ff05 Mon Sep 17 00:00:00 2001 From: Christian Mehlmauer Date: Fri, 30 Jan 2015 15:41:11 +0100 Subject: [PATCH] msftidy --- modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb b/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb index 4760daec4d..91848d4811 100644 --- a/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb +++ b/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb @@ -11,7 +11,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'WordPress XMLRPC Ghost vulnerability scanner', + 'Name' => 'WordPress XMLRPC Ghost Vulnerability Scanner', 'Description' => %q{ This module can be used to determine hosts vulnerable to the Ghost vulnerability via a call to the WordPress XMLRPC interface. If the target is vulnerable, the system @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Auxiliary OptInt.new('COUNT', [false, 'Number of iterations', 2500]), ], self.class) end - + def count datastore['COUNT'] end