Release-related updates

* Lua is not an acronym
  * Adds an OSVDB ref
  * credit @jvazquez-r7, not HD, for the Windows CMD thing
bug/bundler_fix
Tod Beardsley 2013-10-21 13:33:00 -05:00
parent 0255f92e60
commit c070108da6
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
6 changed files with 10 additions and 9 deletions

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB' => '98750'],
['URL' => 'https://sourceforge.net/p/webtesteronline/bugs/3/']
],
'Payload' =>

View File

@ -17,8 +17,8 @@ module Metasploit4
def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix Command Shell, Bind TCP (via LUA)',
'Description' => 'Listen for a connection and spawn a command shell via LUA',
'Name' => 'Unix Command Shell, Bind TCP (via Lua)',
'Description' => 'Listen for a connection and spawn a command shell via Lua',
'Author' =>
[
'xistence <xistence[at]0x90.nl>',

View File

@ -17,8 +17,8 @@ module Metasploit3
def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix Command Shell, Reverse TCP (via LUA)',
'Description' => 'Creates an interactive shell via LUA',
'Name' => 'Unix Command Shell, Reverse TCP (via Lua)',
'Description' => 'Creates an interactive shell via Lua',
'Author' =>
[
'xistence <xistence[at]0x90.nl>',

View File

@ -17,8 +17,8 @@ module Metasploit4
def initialize(info = {})
super(merge_info(info,
'Name' => 'Windows Command Shell, Bind TCP (via LUA)',
'Description' => 'Listen for a connection and spawn a command shell via LUA',
'Name' => 'Windows Command Shell, Bind TCP (via Lua)',
'Description' => 'Listen for a connection and spawn a command shell via Lua',
'Author' =>
[
'xistence <xistence[at]0x90.nl>',

View File

@ -19,7 +19,7 @@ module Metasploit3
super(merge_info(info,
'Name' => 'Windows Command, Generic Command Execution',
'Description' => 'Executes the supplied command',
'Author' => 'hdm',
'Author' => 'juan vazquez',
'License' => MSF_LICENSE,
'Platform' => 'win',
'Arch' => ARCH_CMD,

View File

@ -17,8 +17,8 @@ module Metasploit3
def initialize(info = {})
super(merge_info(info,
'Name' => 'Windows Command Shell, Reverse TCP (via LUA)',
'Description' => 'Creates an interactive shell via LUA',
'Name' => 'Windows Command Shell, Reverse TCP (via Lua)',
'Description' => 'Creates an interactive shell via Lua',
'Author' =>
[
'xistence <xistence[at]0x90.nl>',