From ccf7314c8f7934b836d38d6440c2242521b8c9ac Mon Sep 17 00:00:00 2001 From: m-1-k-3 Date: Thu, 12 Mar 2015 19:05:21 +0100 Subject: [PATCH] msftidy --- modules/exploits/linux/http/multi_ncc_ping_exec.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/linux/http/multi_ncc_ping_exec.rb b/modules/exploits/linux/http/multi_ncc_ping_exec.rb index eacb9f388c..2fa38c6bff 100644 --- a/modules/exploits/linux/http/multi_ncc_ping_exec.rb +++ b/modules/exploits/linux/http/multi_ncc_ping_exec.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'D-Link/TRENDnet ncc Command Injection (ping.ccp)', 'Description' => %q{ This module exploits a remote command injection vulnerability on several routers. - This module was tested in an emulated environment of a DIR-626L only. Several + This module was tested in an emulated environment of a DIR-626L only. Several D-Link and TRENDnet devices are reported as affected: D-Link DIR-626L (Rev A) - v1.04b04, D-Link DIR-636L (Rev A) - v1.04,