Skip to content

Commit 0910c48

Browse files
committed
35 pages of spelling done
1 parent 00c593e commit 0910c48

26 files changed

+30
-30
lines changed

modules/exploits/unix/webapp/zpanel_username_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info={})
1515
This module exploits a vulnerability found in ZPanel's htpasswd module. When
1616
creating .htaccess using the htpasswd module, the username field can be used to
1717
inject system commands, which is passed on to a system() function for executing
18-
the system's htpasswd's command.
18+
the system's htpasswd command.
1919
2020
Please note: In order to use this module, you must have a valid account to login
2121
to ZPanel. An account part of any of the default groups should suffice, such as:

modules/exploits/windows/brightstor/mediasrv_sunrpc.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Name' => 'CA BrightStor ArcServe Media Service Stack Buffer Overflow',
1414
'Description' => %q{
1515
This exploit targets a stack buffer overflow in the MediaSrv RPC service of CA
16-
BrightStor Arcserve. By sending a specially crafted SUNRPC request, an attacker
16+
BrightStor ARCserve. By sending a specially crafted SUNRPC request, an attacker
1717
can overflow a stack buffer and execute arbitrary code.
1818
},
1919
'Author' => [ 'toto' ],

modules/exploits/windows/browser/adobe_flash_regex_value.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info={})
1414
'Description' => %q{
1515
This module exploits a vulnerability found in the ActiveX component of Adobe
1616
Flash Player before 11.5.502.149. By supplying a specially crafted swf file
17-
with special regex value, it is possible to trigger an memory corruption, which
17+
with special regex value, it is possible to trigger a memory corruption, which
1818
results in remote code execution under the context of the user, as exploited in
1919
the wild in February 2013. This module has been tested successfully with Adobe
2020
Flash Player 11.5 before 11.5.502.149 on Windows XP SP3 and Windows 7 SP1 before

modules/exploits/windows/browser/adobe_flash_uncompress_zlib_uninitialized.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ def initialize(info={})
1212
super(update_info(info,
1313
'Name' => 'Adobe Flash Player UncompressViaZlibVariant Uninitialized Memory',
1414
'Description' => %q{
15-
This module exploits an unintialized memory vulnerability in Adobe Flash Player. The
15+
This module exploits an uninitialized memory vulnerability in Adobe Flash Player. The
1616
vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, which fails
1717
to initialize allocated memory. When using a correct memory layout this vulnerability
1818
leads to a ByteArray object corruption, which can be abused to access and corrupt memory.

modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ def initialize(info = {})
2424
2525
NOTE: This module uses a similar DEP bypass method to that used within the
2626
adobe_libtiff module. This method is unlikely to work across various
27-
Windows versions due a the hardcoded syscall number.
27+
Windows versions due a hardcoded syscall number.
2828
},
2929
'License' => MSF_LICENSE,
3030
'Author' =>

modules/exploits/windows/browser/aim_goaway.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
'Description' => %q{
1919
This module exploits a flaw in the handling of AOL Instant
2020
Messenger's 'goaway' URI handler. An attacker can execute
21-
arbitrary code by supplying a overly sized buffer as the
21+
arbitrary code by supplying an overly sized buffer as the
2222
'message' parameter. This issue is known to affect AOL Instant
2323
Messenger 5.5.
2424
},

modules/exploits/windows/browser/ask_shortformat.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Name' => 'Ask.com Toolbar askBar.dll ActiveX Control Buffer Overflow',
1515
'Description' => %q{
1616
This module exploits a stack buffer overflow in Ask.com Toolbar 4.0.2.53.
17-
An attacker may be able to excute arbitrary code by sending an overly
17+
An attacker may be able to execute arbitrary code by sending an overly
1818
long string to the "ShortFormat()" method in askbar.dll.
1919
},
2020
'License' => MSF_LICENSE,

modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Name' => 'BaoFeng Storm mps.dll ActiveX OnBeforeVideoDownload Buffer Overflow',
1414
'Description' => %q{
1515
This module exploits a buffer overflow in BaoFeng's Storm media Player ActiveX
16-
control. Verions of mps.dll including 3.9.4.27 and lower are affected. When passing
16+
control. Versions of mps.dll including 3.9.4.27 and lower are affected. When passing
1717
an overly long string to the method "OnBeforeVideoDownload" an attacker can execute
1818
arbitrary code.
1919
},

modules/exploits/windows/browser/blackice_downloadimagefileurl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ def initialize(info = {})
2626
'Description' => %q{
2727
This module allows remote attackers to place arbitrary files on a users file system
2828
by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX
29-
Control (BIImgFrm.ocx 12.0.0.0). Code exeuction can be acheived by first uploading the
29+
Control (BIImgFrm.ocx 12.0.0.0). Code execution can be achieved by first uploading the
3030
payload to the remote machine, and then upload another mof file, which enables Windows
3131
Management Instrumentation service to execute the binary. Please note that this module
3232
currently only works for Windows before Vista. Also, a similar issue is reported in

modules/exploits/windows/browser/communicrypt_mail_activex.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Name' => 'CommuniCrypt Mail 1.16 SMTP ActiveX Stack Buffer Overflow',
1515
'Description' => %q{
1616
This module exploits a stack buffer overflow in the ANSMTP.dll/AOSMTP.dll
17-
ActiveX Control provided by CommuniCrypt Mail 1.16. By sending a overly
17+
ActiveX Control provided by CommuniCrypt Mail 1.16. By sending an overly
1818
long string to the "AddAttachments()" method, an attacker may be able to
1919
execute arbitrary code.
2020
},

0 commit comments

Comments
 (0)