Skip to content

Commit 2ac02d3

Browse files
committed
Land rapid7#2802, @todb-r7's mods before release
2 parents b02e21a + d6a6343 commit 2ac02d3

File tree

5 files changed

+8
-7
lines changed

5 files changed

+8
-7
lines changed

modules/auxiliary/scanner/chargen/chargen_probe.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize
1616
super(
17-
'Name' => 'Identifies Open Chargen Service Checking The Answer.',
17+
'Name' => 'Chargen Probe Utility',
1818
'Description' => %q{
1919
Chargen is a debugging and measurement tool and a character
2020
generator service. A character generator service simply sends
@@ -31,7 +31,7 @@ def initialize
3131
'License' => MSF_LICENSE,
3232
'References' =>
3333
[
34-
[ 'CVE', '1999-0103' ],
34+
[ 'CVE', '1999-0103' ], # Note, does not actually trigger a flood.
3535
[ 'URL', 'https://www.cert.be/pro/docs/chargensnmp-ddos-attacks-rise' ],
3636
[ 'URL', 'http://tools.ietf.org/html/rfc864' ],
3737
],

modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize
1616
super(
17-
'Name' => 'Poison Ivy C&C Scanner',
17+
'Name' => 'Poison Ivy Command and Control Scanner',
1818
'Description' => %q{
19-
Enumerate Poison Ivy C&C on ports 3460,80,8080 and 443. Adaptation of iTrust Python script.
19+
Enumerate Poison Ivy Command and Control (C&C) on ports 3460, 80, 8080 and 443. Adaptation of iTrust Python script.
2020
},
2121
'References' =>
2222
[

modules/auxiliary/scanner/rdp/ms12_020_check.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@ def initialize(info = {})
2828
],
2929
'Author' =>
3030
[
31-
'Royce Davis @R3dy_ <rdavis[at]accuvant.com>',
32-
'Brandon McCann @zeknox <bmccann[at]accuvant.com>'
31+
'Royce Davis "R3dy" <rdavis[at]accuvant.com>',
32+
'Brandon McCann "zeknox" <bmccann[at]accuvant.com>'
3333
],
3434
'License' => MSF_LICENSE
3535
))

modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ def initialize(info={})
3535
'References' =>
3636
[
3737
[ 'CVE', '2013-6955' ],
38+
[ 'OSVDB', '101247' ]
3839
],
3940
'Privileged' => false,
4041
'Platform' => ['unix'],

modules/post/osx/gather/safari_lastsession.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info={})
1414
super( update_info( info,
1515
'Name' => 'OSX Gather Safari LastSession.plist',
1616
'Description' => %q{
17-
This module downloads the LastSession.plist file from the target machine.
17+
This module downloads the LastSession.plist file from the target machine.
1818
LastSession.plist is used by Safari to track active websites in the current session,
1919
and sometimes contains sensitive information such as usernames and passwords.
2020

0 commit comments

Comments
 (0)