Skip to content

Commit 1a81938

Browse files
committed
Land rapid7#5132, @todb-r7's release fixes
2 parents d5903ca + bd3b651 commit 1a81938

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

modules/auxiliary/scanner/http/goahead_traversal.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'GoAhead Embedded Web Server Directory Traversal',
16+
'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal',
1717
'Description' => %q{
18-
This module exploits a directory traversal vulnerability in the EmbedThis GoAhead Web Server v3.4.1,
18+
This module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1,
1919
allowing to read arbitrary files with the web server privileges.
2020
},
2121
'References' =>

modules/exploits/osx/local/rootpipe.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,12 @@ class Metasploit4 < Msf::Exploit::Local
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'Mac OS X "Rootpipe" Privilege Escalation',
18+
'Name' => 'Apple OS X Rootpipe Privilege Escalation',
1919
'Description' => %q{
2020
This module exploits a hidden backdoor API in Apple's Admin framework on
21-
Mac OS X to escalate privileges to root. Dubbed "Rootpipe."
21+
Mac OS X to escalate privileges to root, dubbed "Rootpipe."
2222
23-
Tested on Yosemite 10.10.2 and should work on previous versions.
23+
This module was tested on Yosemite 10.10.2 and should work on previous versions.
2424
2525
The patch for this issue was not backported to older releases.
2626

0 commit comments

Comments
 (0)