File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'GoAhead Embedded Web Server Directory Traversal' ,
16
+ 'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal' ,
17
17
'Description' => %q{
18
- This module exploits a directory traversal vulnerability in the EmbedThis GoAhead Web Server v3.4.1,
18
+ This module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1,
19
19
allowing to read arbitrary files with the web server privileges.
20
20
} ,
21
21
'References' =>
Original file line number Diff line number Diff line change @@ -15,12 +15,12 @@ class Metasploit4 < Msf::Exploit::Local
15
15
16
16
def initialize ( info = { } )
17
17
super ( update_info ( info ,
18
- 'Name' => 'Mac OS X " Rootpipe" Privilege Escalation' ,
18
+ 'Name' => 'Apple OS X Rootpipe Privilege Escalation' ,
19
19
'Description' => %q{
20
20
This module exploits a hidden backdoor API in Apple's Admin framework on
21
- Mac OS X to escalate privileges to root. Dubbed "Rootpipe."
21
+ Mac OS X to escalate privileges to root, dubbed "Rootpipe."
22
22
23
- Tested on Yosemite 10.10.2 and should work on previous versions.
23
+ This module was tested on Yosemite 10.10.2 and should work on previous versions.
24
24
25
25
The patch for this issue was not backported to older releases.
26
26
You can’t perform that action at this time.
0 commit comments