fix some more titles with periods

git-svn-id: file:///home/svn/framework3/trunk@11127 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-11-24 19:35:38 +00:00
parent f68fc02f9c
commit e9faf75503
25 changed files with 25 additions and 25 deletions

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'IBM DB2 db2rcmd.exe Command Execution Vulnerability.',
'Name' => 'IBM DB2 db2rcmd.exe Command Execution Vulnerability',
'Description' => %q{
This module exploits a vulnerability in the Remote Command Server
component in IBM's DB2 Universal Database 8.1. An authenticated

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Host Integration Server 2006 Command Execution Vulnerability.',
'Name' => 'Microsoft Host Integration Server 2006 Command Execution Vulnerability',
'Description' => %q{
This module exploits a command-injection vulnerability in Microsoft Host Integration Server 2006.
},

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle Account Discovery.',
'Name' => 'Oracle Account Discovery',
'Description' => %q{
This module uses a list of well known default authentication credentials
to discover easily guessed accounts.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'ORACLE SID Brute Forcer.',
'Name' => 'ORACLE SID Brute Forcer',
'Description' => %q{
This module simply attempts to discover the protected SID.
},

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'DB2 Discovery Service Detection.',
'Name' => 'DB2 Discovery Service Detection',
'Version' => '$Revision$',
'Description' => 'This module simply queries the DB2 discovery service for information.',
'Author' => [ 'MC' ],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'EMC AlphaStor Device Manager Service.',
'Name' => 'EMC AlphaStor Device Manager Service',
'Version' => '$Revision$',
'Description' => 'This module querys the remote host for the EMC Alphastor Device Management Service.',
'Author' => 'MC',

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'EMC AlphaStor Library Manager Service.',
'Name' => 'EMC AlphaStor Library Manager Service',
'Version' => '$Revision$',
'Description' => 'This module querys the remote host for the EMC Alphastor Library Management Service.',
'Author' => 'MC',

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'Motorola Timbuktu Service Detection.',
'Name' => 'Motorola Timbuktu Service Detection',
'Description' => %q{
This module simply sends a packet to the Motorola Timbuktu service for detection.
},

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'FreeNAS exec_raw.php Arbitrary Command Execution.',
'Name' => 'FreeNAS exec_raw.php Arbitrary Command Execution',
'Description' => %q{
This module exploits an arbitrary command execution flaw
in FreeNAS 0.7.2 < rev.5543. When passing a specially formatted URL

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'BASE base_qry_common Remote File Include.',
'Name' => 'BASE base_qry_common Remote File Include',
'Description' => %q{
This module exploits a remote file inclusion vulnerability in
the base_qry_common.php file in BASE 1.2.4 and earlier.

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Mambo Cache_Lite Class mosConfig_absolute_path Remote File Include.',
'Name' => 'Mambo Cache_Lite Class mosConfig_absolute_path Remote File Include',
'Description' => %q{
This module exploits a remote file inclusion vulnerability in
includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'America Online ICQ ActiveX Control Arbitrary File Download and Execute.',
'Name' => 'America Online ICQ ActiveX Control Arbitrary File Download and Execute',
'Description' => %q{
This module allows remote attackers to download and execute arbitrary files
on a users system via the DownloadAgent function of the ICQPhone.SipxPhoneManager ActiveX control.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow.',
'Name' => 'Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Microsoft's Visual Studio 6.0.
When passing a specially crafted string to the Mask parameter of the

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute.',
'Name' => 'Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute',
'Description' => %q{
This module allows remote attackers to install and execute arbitrary files on a users file system via
AeXNSPkgDLLib.dll (6.0.0.1418). This module was tested against Symantec Altiris Deployment Solution 6.9 sp3.

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Symantec AppStream LaunchObj ActiveX Control Arbitrary File Download and Execute.',
'Name' => 'Symantec AppStream LaunchObj ActiveX Control Arbitrary File Download and Execute',
'Description' => %q{
This module exploits a vulnerability in Symantec AppStream Client 5.x. The vulnerability
is in the LaunchObj ActiveX control (launcher.dll 5.1.0.82) containing the "installAppMgr()"

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Zenturi ProgramChecker ActiveX Control Arbitrary File Download.',
'Name' => 'Zenturi ProgramChecker ActiveX Control Arbitrary File Download',
'Description' => %q{
This module allows remote attackers to place arbitrary files on a users file system
via the Zenturi ProgramChecker sasatl.dll (1.5.0.531) ActiveX Control.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Cain & Abel <= v4.9.24 RDP Buffer Overflow.',
'Name' => 'Cain & Abel <= v4.9.24 RDP Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24
and below. An attacker must send the file to victim, and the victim must open

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Zinf Audio Player 2.2.1 (PLS File) Stack Buffer Overflow.',
'Name' => 'Zinf Audio Player 2.2.1 (PLS File) Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in the Zinf Audio Player 2.2.1.
An attacker must send the file to victim and the victim must open the file.

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Adobe RoboHelp Server 8 Arbitrary File Upload and Execute.',
'Name' => 'Adobe RoboHelp Server 8 Arbitrary File Upload and Execute',
'Description' => %q{
This module exploits an authentication bypass vulnerability which
allows remote attackers to upload and execute arbitrary code.

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'ColdFusion 8.0.1 Arbitrary File Upload and Execute.',
'Name' => 'ColdFusion 8.0.1 Arbitrary File Upload and Execute',
'Description' => %q{
This module exploits the Adobe ColdFusion 8.0.1 FCKeditor 'CurrentFolder' File Upload
and Execute vulnerability.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Hewlett-Packard Power Manager Administration Buffer Overflow.',
'Name' => 'Hewlett-Packard Power Manager Administration Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Hewlett-Packard Power Manager 4.2.
Sending a specially crafted POST request with an overly long Login string, an

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Realtek Media Player Playlist Buffer Overflow.',
'Name' => 'Realtek Media Player Playlist Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Realtek Media Player(RtlRack) A4.06.
When a Realtek Media Player client opens a specially crafted playlist, an

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Timbuktu Pro Directory Traversal/File Upload.',
'Name' => 'Timbuktu Pro Directory Traversal/File Upload',
'Description' => %q{
This module exploits a directory traversal vulnerablity in Motorola's
Timbuktu Pro for Windows 8.6.5.

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle TNS Listener AUTH_SESSKEY Buffer Overflow.',
'Name' => 'Oracle TNS Listener AUTH_SESSKEY Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Oracle. When
sending a specially crafted packet containing a long AUTH_SESSKEY value

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell NetIdentity Agent XTIERRPCPIPE Named Pipe Buffer Overflow.',
'Name' => 'Novell NetIdentity Agent XTIERRPCPIPE Named Pipe Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Novell's NetIdentity Agent. When sending
a specially crafted string to the 'XTIERRPCPIPE' named pipe, an attacker may be