fix some more titles with periods
git-svn-id: file:///home/svn/framework3/trunk@11127 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
f68fc02f9c
commit
e9faf75503
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'IBM DB2 db2rcmd.exe Command Execution Vulnerability.',
|
||||
'Name' => 'IBM DB2 db2rcmd.exe Command Execution Vulnerability',
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability in the Remote Command Server
|
||||
component in IBM's DB2 Universal Database 8.1. An authenticated
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Microsoft Host Integration Server 2006 Command Execution Vulnerability.',
|
||||
'Name' => 'Microsoft Host Integration Server 2006 Command Execution Vulnerability',
|
||||
'Description' => %q{
|
||||
This module exploits a command-injection vulnerability in Microsoft Host Integration Server 2006.
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle Account Discovery.',
|
||||
'Name' => 'Oracle Account Discovery',
|
||||
'Description' => %q{
|
||||
This module uses a list of well known default authentication credentials
|
||||
to discover easily guessed accounts.
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'ORACLE SID Brute Forcer.',
|
||||
'Name' => 'ORACLE SID Brute Forcer',
|
||||
'Description' => %q{
|
||||
This module simply attempts to discover the protected SID.
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'DB2 Discovery Service Detection.',
|
||||
'Name' => 'DB2 Discovery Service Detection',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'This module simply queries the DB2 discovery service for information.',
|
||||
'Author' => [ 'MC' ],
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'EMC AlphaStor Device Manager Service.',
|
||||
'Name' => 'EMC AlphaStor Device Manager Service',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'This module querys the remote host for the EMC Alphastor Device Management Service.',
|
||||
'Author' => 'MC',
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'EMC AlphaStor Library Manager Service.',
|
||||
'Name' => 'EMC AlphaStor Library Manager Service',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'This module querys the remote host for the EMC Alphastor Library Management Service.',
|
||||
'Author' => 'MC',
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Motorola Timbuktu Service Detection.',
|
||||
'Name' => 'Motorola Timbuktu Service Detection',
|
||||
'Description' => %q{
|
||||
This module simply sends a packet to the Motorola Timbuktu service for detection.
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'FreeNAS exec_raw.php Arbitrary Command Execution.',
|
||||
'Name' => 'FreeNAS exec_raw.php Arbitrary Command Execution',
|
||||
'Description' => %q{
|
||||
This module exploits an arbitrary command execution flaw
|
||||
in FreeNAS 0.7.2 < rev.5543. When passing a specially formatted URL
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'BASE base_qry_common Remote File Include.',
|
||||
'Name' => 'BASE base_qry_common Remote File Include',
|
||||
'Description' => %q{
|
||||
This module exploits a remote file inclusion vulnerability in
|
||||
the base_qry_common.php file in BASE 1.2.4 and earlier.
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Mambo Cache_Lite Class mosConfig_absolute_path Remote File Include.',
|
||||
'Name' => 'Mambo Cache_Lite Class mosConfig_absolute_path Remote File Include',
|
||||
'Description' => %q{
|
||||
This module exploits a remote file inclusion vulnerability in
|
||||
includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'America Online ICQ ActiveX Control Arbitrary File Download and Execute.',
|
||||
'Name' => 'America Online ICQ ActiveX Control Arbitrary File Download and Execute',
|
||||
'Description' => %q{
|
||||
This module allows remote attackers to download and execute arbitrary files
|
||||
on a users system via the DownloadAgent function of the ICQPhone.SipxPhoneManager ActiveX control.
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow.',
|
||||
'Name' => 'Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Microsoft's Visual Studio 6.0.
|
||||
When passing a specially crafted string to the Mask parameter of the
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute.',
|
||||
'Name' => 'Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute',
|
||||
'Description' => %q{
|
||||
This module allows remote attackers to install and execute arbitrary files on a users file system via
|
||||
AeXNSPkgDLLib.dll (6.0.0.1418). This module was tested against Symantec Altiris Deployment Solution 6.9 sp3.
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Symantec AppStream LaunchObj ActiveX Control Arbitrary File Download and Execute.',
|
||||
'Name' => 'Symantec AppStream LaunchObj ActiveX Control Arbitrary File Download and Execute',
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability in Symantec AppStream Client 5.x. The vulnerability
|
||||
is in the LaunchObj ActiveX control (launcher.dll 5.1.0.82) containing the "installAppMgr()"
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Zenturi ProgramChecker ActiveX Control Arbitrary File Download.',
|
||||
'Name' => 'Zenturi ProgramChecker ActiveX Control Arbitrary File Download',
|
||||
'Description' => %q{
|
||||
This module allows remote attackers to place arbitrary files on a users file system
|
||||
via the Zenturi ProgramChecker sasatl.dll (1.5.0.531) ActiveX Control.
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Cain & Abel <= v4.9.24 RDP Buffer Overflow.',
|
||||
'Name' => 'Cain & Abel <= v4.9.24 RDP Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24
|
||||
and below. An attacker must send the file to victim, and the victim must open
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Zinf Audio Player 2.2.1 (PLS File) Stack Buffer Overflow.',
|
||||
'Name' => 'Zinf Audio Player 2.2.1 (PLS File) Stack Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack-based buffer overflow in the Zinf Audio Player 2.2.1.
|
||||
An attacker must send the file to victim and the victim must open the file.
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Adobe RoboHelp Server 8 Arbitrary File Upload and Execute.',
|
||||
'Name' => 'Adobe RoboHelp Server 8 Arbitrary File Upload and Execute',
|
||||
'Description' => %q{
|
||||
This module exploits an authentication bypass vulnerability which
|
||||
allows remote attackers to upload and execute arbitrary code.
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'ColdFusion 8.0.1 Arbitrary File Upload and Execute.',
|
||||
'Name' => 'ColdFusion 8.0.1 Arbitrary File Upload and Execute',
|
||||
'Description' => %q{
|
||||
This module exploits the Adobe ColdFusion 8.0.1 FCKeditor 'CurrentFolder' File Upload
|
||||
and Execute vulnerability.
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Hewlett-Packard Power Manager Administration Buffer Overflow.',
|
||||
'Name' => 'Hewlett-Packard Power Manager Administration Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Hewlett-Packard Power Manager 4.2.
|
||||
Sending a specially crafted POST request with an overly long Login string, an
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Realtek Media Player Playlist Buffer Overflow.',
|
||||
'Name' => 'Realtek Media Player Playlist Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Realtek Media Player(RtlRack) A4.06.
|
||||
When a Realtek Media Player client opens a specially crafted playlist, an
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Timbuktu Pro Directory Traversal/File Upload.',
|
||||
'Name' => 'Timbuktu Pro Directory Traversal/File Upload',
|
||||
'Description' => %q{
|
||||
This module exploits a directory traversal vulnerablity in Motorola's
|
||||
Timbuktu Pro for Windows 8.6.5.
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle TNS Listener AUTH_SESSKEY Buffer Overflow.',
|
||||
'Name' => 'Oracle TNS Listener AUTH_SESSKEY Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Oracle. When
|
||||
sending a specially crafted packet containing a long AUTH_SESSKEY value
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Novell NetIdentity Agent XTIERRPCPIPE Named Pipe Buffer Overflow.',
|
||||
'Name' => 'Novell NetIdentity Agent XTIERRPCPIPE Named Pipe Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Novell's NetIdentity Agent. When sending
|
||||
a specially crafted string to the 'XTIERRPCPIPE' named pipe, an attacker may be
|
||||
|
|
Loading…
Reference in New Issue