Skip to content

Commit 3b0a01e

Browse files
committed
Land rapid7#2746, weekly update grammer/caps fixup
2 parents c59b8fd + e737b13 commit 3b0a01e

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

modules/auxiliary/dos/http/rails_action_view.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,12 @@ class Metasploit3 < Msf::Auxiliary
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'Ruby-on-Rails Action View MIME Memory Exhaustion',
14+
'Name' => 'Ruby on Rails Action View MIME Memory Exhaustion',
1515
'Description' => %q{
1616
This module exploits a Denial of Service (DoS) condition in Action View that requires
17-
a controller action. By sending a specially crafted content-type header to a rails
17+
a controller action. By sending a specially crafted content-type header to a Rails
1818
application, it is possible for it to store the invalid MIME type, and may eventually
19-
consumes all memory if enough invalid MIMEs are given.
19+
consume all memory if enough invalid MIMEs are given.
2020
2121
Versions 3.0.0 and other later versions are affected, fixed in 4.0.2 and 3.2.16.
2222
},

modules/auxiliary/gather/vbulletin_vote_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'vBulletin Password Collector via nodeid SQL Injection',
1616
'Description' => %q{
17-
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has been
17+
This module exploits a SQL injection vulnerability found in vBulletin 5 that has been
1818
used in the wild since March 2013. This module can be used to extract the web application's
1919
usernames and hashes, which could be used to authenticate into the vBulletin admin control
2020
panel.

modules/exploits/unix/webapp/vbulletin_vote_sqli_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection',
1616
'Description' => %q{
17-
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has
17+
This module exploits a SQL injection vulnerability found in vBulletin 5 that has
1818
been used in the wild since March 2013. This module uses the sqli to extract the
1919
web application's usernames and hashes. With the retrieved information tries to
2020
log into the admin control panel in order to deploy the PHP payload. This module

modules/post/windows/gather/forensics/browser_history.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ def initialize(info={})
2222
super( update_info( info,
2323
'Name' => 'Windows Gather Skype, Firefox, and Chrome Artifacts',
2424
'Description' => %q{
25-
Gathers Skype chat logs, Firefox history, and Chrome history data from the victim machine.
25+
Gathers Skype chat logs, Firefox history, and Chrome history data from the target machine.
2626
},
2727
'License' => MSF_LICENSE,
2828
'Author' => [ 'Joshua Harper (@JonValt) <josh at radixtx dot com>' ],

test/modules/post/test/extapi.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ class Metasploit4 < Msf::Post
1111

1212
def initialize(info={})
1313
super( update_info( info,
14-
'Name' => 'Testing Meterpreter ExtAPI Stuff',
14+
'Name' => 'Test Meterpreter ExtAPI Stuff',
1515
'Description' => %q{ This module will test Windows Extended API methods },
1616
'License' => MSF_LICENSE,
1717
'Author' => [ 'Ben Campbell'],

0 commit comments

Comments
 (0)