File tree Expand file tree Collapse file tree 5 files changed +8
-8
lines changed
exploits/windows/antivirus Expand file tree Collapse file tree 5 files changed +8
-8
lines changed Original file line number Diff line number Diff line change @@ -19,7 +19,7 @@ def initialize(info = {})
19
19
This module exploits a SQL injection vulnerability found in Advantech WebAccess 7.1. The
20
20
vulnerability exists in the DBVisitor.dll component, and can be abused through malicious
21
21
requests to the ChartThemeConfig web service. This module can be used to extract the site
22
- and projects usernames and hashes.
22
+ and project usernames and hashes.
23
23
} ,
24
24
'References' =>
25
25
[
Original file line number Diff line number Diff line change @@ -44,7 +44,7 @@ def run_host(ip)
44
44
row . each { |val | @hashes << val . value . to_s }
45
45
end
46
46
47
- print_good ( "#{ ip } Found Users & Password Hashes :" )
47
+ print_good ( "#{ ip } - Found user and password hashes :" )
48
48
end
49
49
50
50
credinfo = ""
@@ -67,7 +67,7 @@ def run_host(ip)
67
67
rescue ::Interrupt
68
68
raise $!
69
69
rescue ::Exception => e
70
- print_error ( "#{ ip } error : #{ e . class } #{ e } " )
70
+ print_error ( "#{ ip } - Error : #{ e . class } #{ e } " )
71
71
disconnect_snmp
72
72
end
73
73
end
Original file line number Diff line number Diff line change @@ -95,7 +95,7 @@ def run_host(ip)
95
95
rescue ::Interrupt
96
96
raise $!
97
97
rescue ::Exception => e
98
- print_error ( "#{ ip } error : #{ e . class } #{ e } " )
98
+ print_error ( "#{ ip } - Error : #{ e . class } #{ e } " )
99
99
disconnect_snmp
100
100
end
101
101
end
Original file line number Diff line number Diff line change @@ -152,7 +152,7 @@ def run_host(ip)
152
152
rescue ::Interrupt
153
153
raise $!
154
154
rescue ::Exception => e
155
- print_error ( "#{ ip } error : #{ e . class } #{ e } " )
155
+ print_error ( "#{ ip } - Error : #{ e . class } #{ e } " )
156
156
disconnect_snmp
157
157
end
158
158
end
Original file line number Diff line number Diff line change @@ -19,11 +19,11 @@ def initialize(info = {})
19
19
'Description' => %q{
20
20
This module exploits a code execution flaw in Symantec Workspace Streaming. The
21
21
vulnerability exists in the ManagementAgentServer.putFile XMLRPC call exposed by the
22
- as_agent.exe service, which allows to upload arbitrary files under the server root.
23
- This module abuses the auto deploy feature at the JBoss as_ste.exe's instance in order
22
+ as_agent.exe service, which allows for uploading arbitrary files under the server root.
23
+ This module abuses the auto deploy feature in the JBoss as_ste.exe instance in order
24
24
to achieve remote code execution. This module has been tested successfully on Symantec
25
25
Workspace Streaming 6.1 SP8 and Windows 2003 SP2. Abused services listen on a single
26
- machine deployment, and also at the backend role in a multiple machines deployment
26
+ machine deployment, and also in the backend role in a multiple machine deployment.
27
27
} ,
28
28
'Author' =>
29
29
[
You can’t perform that action at this time.
0 commit comments