git-svn-id: file:///home/svn/framework3/trunk@9488 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-06-11 16:12:05 +00:00
parent 565397e989
commit e32abab8dc
8 changed files with 12 additions and 12 deletions

View File

@ -301,7 +301,7 @@ class Client
end
#
# Transmit a HTTP request and receive the response
# Transmit an HTTP request and receive the response
# If persist is set, then the request will attempt
# to reuse an existing connection.
#
@ -312,7 +312,7 @@ class Client
end
#
# Send a HTTP request to the server
# Send an HTTP request to the server
#
def send_request(req)
connect

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
This module tests for directory traversal vulnerability in the UpdateAgent
function in the OfficeScanNT Listener (TmListen.exe) service in Trend Micro
OfficeScan. This allows remote attackers to read arbitrary files as SYSTEM
via dot dot sequences in a HTTP request.
via dot dot sequences in an HTTP request.
},
'References' =>
[

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
super(
'Name' => 'HTTP Login Utility',
'Version' => '$Revision$',
'Description' => 'This module attempts to authenticate to a HTTP service.',
'Description' => 'This module attempts to authenticate to an HTTP service.',
'References' =>
[

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
#
# This module acts as a HTTP server
# This module acts as an HTTP server
#
include Msf::Exploit::Remote::HttpServer::HTML

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
#
# This module acts as a HTTP server
# This module acts as an HTTP server
#
include Msf::Exploit::Remote::HttpServer::HTML

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Streamcast <= 0.9.75 HTTP User-Agent Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Streamcast <= 0.9.75. By sending
an overly long User-Agent in a HTTP GET request, an attacker may be able to
an overly long User-Agent in an HTTP GET request, an attacker may be able to
execute arbitrary code.
},
'Author' => [

View File

@ -23,7 +23,7 @@ module Metasploit3
super(update_info(info,
'Name' => 'PHP Executable Download and Execute',
'Version' => '$Revision$',
'Description' => 'Download an EXE from a HTTP URL and execute it',
'Description' => 'Download an EXE from an HTTP URL and execute it',
'Author' => [ 'egypt' ],
'License' => BSD_LICENSE,
'Platform' => 'php',

View File

@ -23,7 +23,7 @@ module Metasploit3
super(update_info(info,
'Name' => 'Windows Executable Download and Execute',
'Version' => '$Revision$',
'Description' => 'Download an EXE from a HTTP URL and execute it',
'Description' => 'Download an EXE from an HTTP URL and execute it',
'Author' => [ 'lion[at]cnhonker.com', 'pita[at]mail.com' ],
'License' => BSD_LICENSE,
'Platform' => 'win',