Addressed most of @wvu's issues with #5312

bug/bundler_fix
Tod Beardsley 2015-05-06 14:47:08 -05:00
parent f423306b6f
commit e8913e5620
No known key found for this signature in database
GPG Key ID: BD63D0A3EA19CAAC
3 changed files with 5 additions and 5 deletions

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
execution. This module will try to cause a denial-of-service.
Please note that a valid file resource must be supplied for the TARGETURI option.
By default, IIS, by default, provides these resources: welcome.png, and iis-85.png.
By default, IIS, provides 'welcome.png' and 'iis-85.png' as resources.
Others may also exist, depending on configuration options.
},
'Author' =>

View File

@ -16,8 +16,8 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal',
'Description' => %q{
This module exploits a directory traversal vulnerability in the Embedthis
GoAhead Web Server v3.4.1, allowing to read arbitrary files with the web
server privileges.
GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files
with the web server privileges.
},
'References' =>
[

View File

@ -14,8 +14,8 @@ class Metasploit3 < Msf::Auxiliary
super(
'Name' => 'Outlook Web App (OWA) / Client Access Server (CAS) IIS HTTP Internal IP Disclosure',
'Description' => %q{
This module tests vulnerable IIS HTTP header file paths on Microsoft Exchange OWA 2003,
CAS 2007, 2010, 2013 servers.
This module tests vulnerable IIS HTTP header file paths on Microsoft
Exchange OWA 2003 and CAS 2007, 2010, and 2013 servers.
},
'Author' =>
[