Grammar fixes in descriptions
parent
fd7501d729
commit
aff35a615b
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
The vulnerability exists on the opcactivate.vbs script, which
|
The vulnerability exists on the opcactivate.vbs script, which
|
||||||
is reachable from the APIBSMIntegrationImpl AXIS service, and
|
is reachable from the APIBSMIntegrationImpl AXIS service, and
|
||||||
uses WScript.Shell.run() to execute cmd.exe with user provided
|
uses WScript.Shell.run() to execute cmd.exe with user provided
|
||||||
data. Note which the opcactivate.vbs component is installed
|
data. Note that the opcactivate.vbs component is installed
|
||||||
with the (optional) HP Operations Agent component. The module
|
with the (optional) HP Operations Agent component. The module
|
||||||
has been tested successfully on HP SiteScope 11.20 (with HP
|
has been tested successfully on HP SiteScope 11.20 (with HP
|
||||||
Operations Agent) over Windows 2003 SP2.
|
Operations Agent) over Windows 2003 SP2.
|
||||||
|
|
|
@ -23,12 +23,8 @@ class Metasploit3 < Msf::Post
|
||||||
Error Log page in the web interface, the cupsd daemon (running with setuid root)
|
Error Log page in the web interface, the cupsd daemon (running with setuid root)
|
||||||
reads the Error Log path and echoes it as plaintext.
|
reads the Error Log path and echoes it as plaintext.
|
||||||
|
|
||||||
This module is known to work on:
|
This module is known to work on Mac OS X < 10.8.4 and Ubuntu Desktop <= 12.0.4
|
||||||
|
as long as the session is in the lpadmin group.
|
||||||
- Mac OS X < 10.8.4
|
|
||||||
- Ubuntu Desktop <= 12.0.4
|
|
||||||
|
|
||||||
...as long as the session is in the lpadmin group.
|
|
||||||
|
|
||||||
Warning: if the user has set up a custom path to the CUPS error log,
|
Warning: if the user has set up a custom path to the CUPS error log,
|
||||||
this module might fail to reset that path correctly. You can specify
|
this module might fail to reset that path correctly. You can specify
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
'Name' => 'Windows Capture Winlogon Lockout Credential Keylogger',
|
'Name' => 'Windows Capture Winlogon Lockout Credential Keylogger',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module migrates and logs Microsoft Windows user's passwords via
|
This module migrates and logs Microsoft Windows user's passwords via
|
||||||
Winlogon.exe. Using idle time and natural system changes to give a
|
Winlogon.exe using idle time and natural system changes to give a
|
||||||
false sense of security to the user.},
|
false sense of security to the user.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'mubix', 'cg' ],
|
'Author' => [ 'mubix', 'cg' ],
|
||||||
|
|
Loading…
Reference in New Issue