Skip to content

Commit 25ebb05

Browse files
committed
Add next chunk of fixes
Going roughly a third at a time.
1 parent 170608e commit 25ebb05

24 files changed

+68
-62
lines changed

modules/exploits/unix/webapp/tikiwiki_unserialize_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Tiki Wiki <= 8.3 unserialize() PHP Code Execution',
15+
'Name' => 'Tiki Wiki unserialize() PHP Code Execution',
1616
'Description' => %q{
1717
This module exploits a php unserialize() vulnerability in Tiki Wiki <= 8.3
1818
which could be abused to allow unauthenticated users to execute arbitrary code

modules/exploits/windows/brightstor/lgserver.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow',
16+
'Name' => 'CA BrightStor ARCserve for Laptops and Desktops LGServer Buffer Overflow',
1717
'Description' => %q{
1818
This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup
1919
for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could

modules/exploits/windows/brightstor/lgserver_multi.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'CA BrightStor ARCserve for Laptops & Desktops LGServer Multiple Commands Buffer Overflow',
17+
'Name' => 'CA BrightStor ARCserve for Laptops and Desktops LGServer Multiple Commands Buffer Overflow',
1818
'Description' => %q{
1919
This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup
2020
for Laptops & Desktops 11.1. By sending a specially crafted request to multiple commands,

modules/exploits/windows/brightstor/lgserver_rxrlogin.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow',
15+
'Name' => 'CA BrightStor ARCserve for Laptops and Desktops LGServer Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup
1818
for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could

modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'CA BrightStor ARCserve for Laptops & Desktops LGServer (rxsSetDataGrowthScheduleAndFilter) Buffer Overflow',
16+
'Name' => 'CA BrightStor ARCserve for Laptops and Desktops LGServer rxsSetDataGrowthScheduleAndFilter Buffer Overflow',
1717
'Description' => %q{
1818
This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup
1919
for Laptops & Desktops 11.1. By sending a specially crafted request (rxsSetDataGrowthScheduleAndFilter),

modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow',
15+
'Name' => 'CA BrightStor ARCserve for Laptops and Desktops LGServer Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup
1818
for Laptops & Desktops 11.1. By sending a specially crafted request (rxsUseLicenseIni), an

modules/exploits/windows/browser/dxstudio_player_exec.rb

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,21 +14,21 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'Worldweaver DX Studio Player <= 3.0.29 shell.execute() Command Execution',
17+
'Name' => 'Worldweaver DX Studio Player shell.execute() Command Execution',
1818
'Description' => %q{
19-
This module exploits a command execution vulnerability within the
20-
DX Studio Player from Worldweaver. The player is a browser plugin for
21-
IE (ActiveX) and Firefox (dll). When an unsuspecting user visits a web
22-
page referring to a specially crafted .dxstudio document, an attacker can
23-
execute arbitrary commands.
24-
25-
Testing was conducted using plugin version 3.0.29.0 for Firefox 2.0.0.20 and
26-
IE 6 on Windows XP SP3. In IE, the user will be prompted if they wish to allow
27-
the plug-in to access local files. This prompt appears to occur only once per
28-
server host.
29-
30-
NOTE: This exploit uses additionally dangerous script features to write to
31-
local files!
19+
This module exploits a command execution vulnerability within the DX
20+
Studio Player from Worldweaver for versions 3.0.29 and earlier. The
21+
player is a browser plugin for IE (ActiveX) and Firefox (dll). When an
22+
unsuspecting user visits a web page referring to a specially crafted
23+
.dxstudio document, an attacker can execute arbitrary commands.
24+
25+
Testing was conducted using plugin version 3.0.29.0 for Firefox 2.0.0.20
26+
and IE 6 on Windows XP SP3. In IE, the user will be prompted if they
27+
wish to allow the plug-in to access local files. This prompt appears to
28+
occur only once per server host.
29+
30+
NOTE: This exploit uses additionally dangerous script features to write
31+
to local files!
3232
},
3333
'License' => MSF_LICENSE,
3434
'Author' => [ 'jduck' ],

modules/exploits/windows/browser/mozilla_nssvgvalue.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Firefox 7/8 (<= 8.0.1) nsSVGValue Out-of-Bounds Access Vulnerability',
16+
'Name' => 'Firefox nsSVGValue Out-of-Bounds Access Vulnerability',
1717
'Description' => %q{
1818
This module exploits an out-of-bounds access flaw in Firefox 7 and 8 (<= 8.0.1).
1919
The notification of nsSVGValue observers via nsSVGValue::NotifyObservers(x,y)

modules/exploits/windows/browser/novelliprint_getdriversettings_2.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super( update_info(info,
15-
'Name' => 'Novell iPrint Client ActiveX Control <= 5.52 Buffer Overflow',
15+
'Name' => 'Novell iPrint Client ActiveX Control Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in Novell iPrint Client 5.52. When
1818
sending an overly long string to the GetDriverSettings() property of ienipp.ocx

modules/exploits/windows/browser/teechart_pro.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super( update_info(info,
15-
'Name' => 'TeeChart Professional ActiveX Control <= 2010.0.0.3 Trusted Integer Dereference',
15+
'Name' => 'TeeChart Professional ActiveX Control Trusted Integer Dereference',
1616
'Description' => %q{
1717
This module exploits a integer overflow in TeeChart Pro ActiveX control. When
1818
sending an overly large/negative integer value to the AddSeries() property of

0 commit comments

Comments
 (0)