Skip to content

Commit 49a6057

Browse files
author
Tod Beardsley
committed
Grammaring harder
1 parent 9fadc39 commit 49a6057

File tree

9 files changed

+16
-19
lines changed

9 files changed

+16
-19
lines changed

modules/auxiliary/scanner/http/symantec_web_gateway_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info={})
1818
super(update_info(info,
1919
'Name' => 'Symantec Web Gateway Login Utility',
2020
'Description' => %q{
21-
This module will attempt to authenticate to a Symantec Web Gateway
21+
This module will attempt to authenticate to a Symantec Web Gateway.
2222
},
2323
'Author' => [ 'sinn3r' ],
2424
'License' => MSF_LICENSE,

modules/auxiliary/scanner/smb/smb_uninit_cred.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ def initialize(info={})
2828
super(update_info(info,
2929
'Name' => 'Samba _netr_ServerPasswordSet Uninitialized Credential State',
3030
'Description' => %q{
31-
This module checks if your Samba target is vulnerable to an uninitialized variable creds.
31+
This module checks if a Samba target is vulnerable to an uninitialized variable creds vulnerability.
3232
},
3333
'Author' =>
3434
[

modules/exploits/linux/http/belkin_login_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
Wireless Dual-Band N+ Router N750 routers. The vulnerability exists in the handling
2020
of HTTP queries with long 'jump' parameters addressed to the /login.cgi URL, allowing
2121
remote unauthenticated attackers to execute arbitrary code. This module was tested in
22-
an emulated environment, using the version 1.10.16.m of the firmwarey.
22+
an emulated environment, using the version 1.10.16.m of the firmware.
2323
},
2424
'Author' =>
2525
[

modules/exploits/linux/smtp/exim_gethostbyname_bof.rb

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,11 @@ class Metasploit4 < Msf::Exploit::Remote
1313
def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'Exim GHOST (glibc gethostbyname) Buffer Overflow',
16-
'Description' => %q(
17-
This module remotely exploits CVE-2015-0235 (a.k.a. GHOST, a heap-based
18-
buffer overflow in the GNU C Library's gethostbyname functions) on x86
16+
'Description' => %q{
17+
This module remotely exploits CVE-2015-0235, aka GHOST, a heap-based
18+
buffer overflow in the GNU C Library's gethostbyname functions on x86
1919
and x86_64 GNU/Linux systems that run the Exim mail server.
20-
21-
For additional information, please refer to the module's References
22-
section.
23-
),
20+
},
2421
'Author' => ['Qualys, Inc. <qsa[at]qualys.com>'],
2522
'License' => BSD_LICENSE,
2623
'References' => [

modules/exploits/unix/http/twiki_debug_plugins.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
'Description' => %q{
1717
TWiki 4.0.x-6.0.0 contains a vulnerability in the Debug functionality.
1818
The value of the debugenableplugins parameter is used without proper sanitization
19-
in an Perl eval statement which allows remote code execution
19+
in an Perl eval statement which allows remote code execution.
2020
},
2121
'Author' =>
2222
[

modules/exploits/unix/webapp/wp_foxypress_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
This module exploits an arbitrary PHP code execution flaw in the WordPress
2020
blogging software plugin known as Foxypress. The vulnerability allows for arbitrary
2121
file upload and remote code execution via the uploadify.php script. The Foxypress
22-
plug-in versions 0.4.1.1 to 0.4.2.1 are vulnerable.
22+
plugin versions 0.4.1.1 to 0.4.2.1 are vulnerable.
2323
),
2424
'Author' =>
2525
[

modules/exploits/unix/webapp/wp_optimizepress_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'WordPress OptimizePress Theme File Upload Vulnerability',
1818
'Description' => %q{
19-
This module exploits a vulnerability found in the the Wordpress theme OptimizePress. The
19+
This module exploits a vulnerability found in the the WordPress theme OptimizePress. The
2020
vulnerability is due to an insecure file upload on the media-upload.php component, allowing
2121
an attacker to upload arbitrary PHP code. This module has been tested successfully on
2222
OptimizePress 1.45.

modules/exploits/unix/webapp/wp_total_cache_exec.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,17 @@ class Metasploit3 < Msf::Exploit::Remote
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'Wordpress W3 Total Cache PHP Code Execution',
14+
'Name' => 'WordPress W3 Total Cache PHP Code Execution',
1515
'Description' => %q{
16-
This module exploits a PHP Code Injection vulnerability against Wordpress plugin
16+
This module exploits a PHP Code Injection vulnerability against WordPress plugin
1717
W3 Total Cache for versions up to and including 0.9.2.8. WP Super Cache 1.2 or older
1818
is also reported as vulnerable. The vulnerability is due to the handling of certain
1919
macros such as mfunc, which allows arbitrary PHP code injection. A valid post ID is
2020
needed in order to add the malicious comment. If the POSTID option isn't specified,
2121
then the module will automatically find or bruteforce one. Also, if anonymous comments
2222
aren't allowed, then a valid username and password must be provided. In addition,
23-
the "A comment is held for moderation" option on Wordpress must be unchecked for
24-
successful exploitation. This module has been tested against Wordpress 3.5 and
23+
the "A comment is held for moderation" option on WordPress must be unchecked for
24+
successful exploitation. This module has been tested against WordPress 3.5 and
2525
W3 Total Cache 0.9.2.3 on a Ubuntu 10.04 system.
2626
},
2727
'Author' =>

modules/exploits/windows/local/powershell_remoting.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Powershell Remoting Remote Command Execution',
1717
'Description' => %q{
18-
Uses Powershell Remoting (TCP 47001) to inject payloads on target machines.
19-
If RHOSTS are specified it will try to resolve the IPs to hostnames, otherwise
18+
This module uses Powershell Remoting (TCP 47001) to inject payloads on target machines.
19+
If RHOSTS are specified, it will try to resolve the IPs to hostnames, otherwise
2020
use a HOSTFILE to supply a list of known hostnames.
2121
},
2222
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)