Land #5521, @todb-r7's module cleanup

bug/bundler_fix
William Vu 2015-06-10 11:29:41 -05:00
commit b23647d5ae
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743
2 changed files with 4 additions and 4 deletions

View File

@ -9,11 +9,11 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info, super(update_info(info,
'Name' => 'AVTECH 744 DVR Account Information Retrieval', 'Name' => 'AVTECH 744 DVR Account Information Retrieval',
'Description' => %q{ 'Description' => %q{
This module will extract the accounts information from the AVTECH 744 DVR devices, This module will extract the account information from the AVTECH 744 DVR devices,
including all the usernames and cleartext passwords plus the device PIN, along with including usernames, cleartext passwords, and the device PIN, along with
a few other miscellaneous details. In order to extract the information, hardcoded a few other miscellaneous details. In order to extract the information, hardcoded
credentials admin/admin are used. These credentials can't be changed from the device credentials admin/admin are used. These credentials can't be changed from the device
console UI neither the web UI. console UI nor from the web UI.
}, },
'Author' => [ 'nstarke' ], 'Author' => [ 'nstarke' ],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a type confusion vulnerability in the NetConnection class on This module exploits a type confusion vulnerability in the NetConnection class on
Adobe Flash Player. When using a correct memory layout this vulnerability allows Adobe Flash Player. When using a correct memory layout this vulnerability allows
to corrupt arbitrary memory. It can be used to overwrite dangerous objects, like to corrupt arbitrary memory. It can be used to overwrite dangerous objects, like
vectors, and finally accomplish remote code execution. This module has been tested vectors, and ultimately accomplish remote code execution. This module has been tested
successfully on: successfully on:
* Windows 7 SP1 (32-bit), IE 8, IE11 and Adobe Flash 16.0.0.305. * Windows 7 SP1 (32-bit), IE 8, IE11 and Adobe Flash 16.0.0.305.
* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 16.0.0.305. * Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 16.0.0.305.