a HTTP -> an HTTP (http://www.english-zone.com/grammar/a-anlessn.html)
git-svn-id: file:///home/svn/framework3/trunk@9488 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
565397e989
commit
e32abab8dc
|
@ -301,7 +301,7 @@ class Client
|
|||
end
|
||||
|
||||
#
|
||||
# Transmit a HTTP request and receive the response
|
||||
# Transmit an HTTP request and receive the response
|
||||
# If persist is set, then the request will attempt
|
||||
# to reuse an existing connection.
|
||||
#
|
||||
|
@ -312,7 +312,7 @@ class Client
|
|||
end
|
||||
|
||||
#
|
||||
# Send a HTTP request to the server
|
||||
# Send an HTTP request to the server
|
||||
#
|
||||
def send_request(req)
|
||||
connect
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
This module tests for directory traversal vulnerability in the UpdateAgent
|
||||
function in the OfficeScanNT Listener (TmListen.exe) service in Trend Micro
|
||||
OfficeScan. This allows remote attackers to read arbitrary files as SYSTEM
|
||||
via dot dot sequences in a HTTP request.
|
||||
via dot dot sequences in an HTTP request.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(
|
||||
'Name' => 'HTTP Login Utility',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'This module attempts to authenticate to a HTTP service.',
|
||||
'Description' => 'This module attempts to authenticate to an HTTP service.',
|
||||
'References' =>
|
||||
[
|
||||
|
||||
|
|
|
@ -14,10 +14,10 @@ require 'msf/core'
|
|||
class Metasploit3 < Msf::Exploit::Remote
|
||||
Rank = GreatRanking
|
||||
|
||||
#
|
||||
# This module acts as a HTTP server
|
||||
#
|
||||
include Msf::Exploit::Remote::HttpServer::HTML
|
||||
#
|
||||
# This module acts as an HTTP server
|
||||
#
|
||||
include Msf::Exploit::Remote::HttpServer::HTML
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Rank = GreatRanking
|
||||
|
||||
#
|
||||
# This module acts as a HTTP server
|
||||
# This module acts as an HTTP server
|
||||
#
|
||||
include Msf::Exploit::Remote::HttpServer::HTML
|
||||
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'Streamcast <= 0.9.75 HTTP User-Agent Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Streamcast <= 0.9.75. By sending
|
||||
an overly long User-Agent in a HTTP GET request, an attacker may be able to
|
||||
an overly long User-Agent in an HTTP GET request, an attacker may be able to
|
||||
execute arbitrary code.
|
||||
},
|
||||
'Author' => [
|
||||
|
|
|
@ -23,7 +23,7 @@ module Metasploit3
|
|||
super(update_info(info,
|
||||
'Name' => 'PHP Executable Download and Execute',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Download an EXE from a HTTP URL and execute it',
|
||||
'Description' => 'Download an EXE from an HTTP URL and execute it',
|
||||
'Author' => [ 'egypt' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Platform' => 'php',
|
||||
|
|
|
@ -23,7 +23,7 @@ module Metasploit3
|
|||
super(update_info(info,
|
||||
'Name' => 'Windows Executable Download and Execute',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Download an EXE from a HTTP URL and execute it',
|
||||
'Description' => 'Download an EXE from an HTTP URL and execute it',
|
||||
'Author' => [ 'lion[at]cnhonker.com', 'pita[at]mail.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Platform' => 'win',
|
||||
|
|
Loading…
Reference in New Issue