Land #5521, @todb-r7's module cleanup

bug/bundler_fix
William Vu 2015-06-10 11:29:41 -05:00
commit b23647d5ae
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743
2 changed files with 4 additions and 4 deletions

View File

@ -9,11 +9,11 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => 'AVTECH 744 DVR Account Information Retrieval',
'Description' => %q{
This module will extract the accounts information from the AVTECH 744 DVR devices,
including all the usernames and cleartext passwords plus the device PIN, along with
This module will extract the account information from the AVTECH 744 DVR devices,
including usernames, cleartext passwords, and the device PIN, along with
a few other miscellaneous details. In order to extract the information, hardcoded
credentials admin/admin are used. These credentials can't be changed from the device
console UI neither the web UI.
console UI nor from the web UI.
},
'Author' => [ 'nstarke' ],
'License' => MSF_LICENSE

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a type confusion vulnerability in the NetConnection class on
Adobe Flash Player. When using a correct memory layout this vulnerability allows
to corrupt arbitrary memory. It can be used to overwrite dangerous objects, like
vectors, and finally accomplish remote code execution. This module has been tested
vectors, and ultimately accomplish remote code execution. This module has been tested
successfully on:
* Windows 7 SP1 (32-bit), IE 8, IE11 and Adobe Flash 16.0.0.305.
* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 16.0.0.305.