Skip to content

Commit 305e35c

Browse files
committed
Land rapid7#5655, @todb-r7's module cleanup
2 parents 2b21a4f + 8892cbd commit 305e35c

File tree

3 files changed

+10
-6
lines changed

3 files changed

+10
-6
lines changed

modules/exploits/multi/browser/adobe_flash_nellymoser_bof.rb

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,13 @@ def initialize(info={})
2020
2121
Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.160,
2222
Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.160,
23-
Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160, and
24-
Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466.
23+
Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160,
24+
Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466, and
2525
Ubuntu 14.04.2 LTS, Firefox 35.01, and Adobe Flash 11.2.202.466.
26+
27+
Note that this exploit is effective against both CVE-2015-3113 and the
28+
earlier CVE-2015-3043, since CVE-2015-3113 is effectively a regression
29+
to the same root cause as CVE-2015-3043.
2630
},
2731
'License' => MSF_LICENSE,
2832
'Author' =>

modules/post/windows/gather/credentials/enum_laps.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ def initialize(info={})
2222
'Name' => 'Windows Gather Credentials Local Administrator Password Solution',
2323
'Description' => %Q{
2424
This module will recover the LAPS (Local Administrator Password Solution) passwords,
25-
configured in active directory. Note, only privileged users should be able to access
26-
these fields. Note: The local administrator account name is not stored in active directory,
27-
so we assume that this will be 'Administrator' by default.
25+
configured in Active Directory, which is usually only accessible by privileged users.
26+
Note that the local administrator account name is not stored in Active Directory,
27+
so it is assumed to be 'Administrator' by default.
2828
},
2929
'License' => MSF_LICENSE,
3030
'Author' =>

modules/post/windows/gather/enum_ad_bitlocker.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
'Name' => 'Windows Gather Active Directory BitLocker Recovery',
1717
'Description' => %q{
1818
This module will enumerate BitLocker recovery passwords in the default AD
19-
directory. Requires Domain Admin or other delegated privileges.
19+
directory. This module does require Domain Admin or other delegated privileges.
2020
},
2121
'License' => MSF_LICENSE,
2222
'Author' => ['Ben Campbell <ben.campbell[at]mwrinfosecurity.com>'],

0 commit comments

Comments
 (0)