diff --git a/modules/auxiliary/scanner/http/goahead_traversal.rb b/modules/auxiliary/scanner/http/goahead_traversal.rb index 1f7a44a9d9..018a8f4759 100644 --- a/modules/auxiliary/scanner/http/goahead_traversal.rb +++ b/modules/auxiliary/scanner/http/goahead_traversal.rb @@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'GoAhead Embedded Web Server Directory Traversal', + 'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal', 'Description' => %q{ - This module exploits a directory traversal vulnerability in the EmbedThis GoAhead Web Server v3.4.1, + This module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1, allowing to read arbitrary files with the web server privileges. }, 'References' => diff --git a/modules/exploits/osx/local/rootpipe.rb b/modules/exploits/osx/local/rootpipe.rb index b5f6bfb0aa..db61b44b1a 100644 --- a/modules/exploits/osx/local/rootpipe.rb +++ b/modules/exploits/osx/local/rootpipe.rb @@ -15,12 +15,12 @@ class Metasploit4 < Msf::Exploit::Local def initialize(info = {}) super(update_info(info, - 'Name' => 'Mac OS X "Rootpipe" Privilege Escalation', + 'Name' => 'Apple OS X Rootpipe Privilege Escalation', 'Description' => %q{ This module exploits a hidden backdoor API in Apple's Admin framework on - Mac OS X to escalate privileges to root. Dubbed "Rootpipe." + Mac OS X to escalate privileges to root, dupped "Rootpipe." - Tested on Yosemite 10.10.2 and should work on previous versions. + This module was tested on Yosemite 10.10.2 and should work on previous versions. The patch for this issue was not backported to older releases.