Addressed most of @wvu's issues with #5312
parent
f423306b6f
commit
e8913e5620
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
execution. This module will try to cause a denial-of-service.
|
||||
|
||||
Please note that a valid file resource must be supplied for the TARGETURI option.
|
||||
By default, IIS, by default, provides these resources: welcome.png, and iis-85.png.
|
||||
By default, IIS, provides 'welcome.png' and 'iis-85.png' as resources.
|
||||
Others may also exist, depending on configuration options.
|
||||
},
|
||||
'Author' =>
|
||||
|
|
|
@ -16,8 +16,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal',
|
||||
'Description' => %q{
|
||||
This module exploits a directory traversal vulnerability in the Embedthis
|
||||
GoAhead Web Server v3.4.1, allowing to read arbitrary files with the web
|
||||
server privileges.
|
||||
GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files
|
||||
with the web server privileges.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -14,8 +14,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(
|
||||
'Name' => 'Outlook Web App (OWA) / Client Access Server (CAS) IIS HTTP Internal IP Disclosure',
|
||||
'Description' => %q{
|
||||
This module tests vulnerable IIS HTTP header file paths on Microsoft Exchange OWA 2003,
|
||||
CAS 2007, 2010, 2013 servers.
|
||||
This module tests vulnerable IIS HTTP header file paths on Microsoft
|
||||
Exchange OWA 2003 and CAS 2007, 2010, and 2013 servers.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue