Skip to content

Commit 4ca9a88

Browse files
author
Tod Beardsley
committed
Tidying up grammar and titles
1 parent b8ed1f9 commit 4ca9a88

File tree

4 files changed

+8
-7
lines changed

4 files changed

+8
-7
lines changed

modules/auxiliary/dos/http/monkey_headers.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'Monkey HTTPD Header Parsing Denial-of-Service',
17+
'Name' => 'Monkey HTTPD Header Parsing Denial of Service (DoS)',
1818
'Description' => %q{
1919
This module causes improper header parsing that leads to a segmentation fault
2020
due to a specially crafted HTTP request. Affects version <= 1.2.0.

modules/auxiliary/scanner/http/infovista_enum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
1717

1818
def initialize(info={})
1919
super(update_info(info,
20-
'Name' => 'InfoVista VistaPortal Application Brute Force Login Utility',
20+
'Name' => 'InfoVista VistaPortal Application Bruteforce Login Utility',
2121
'Description' => %{
2222
This module attempts to scan for InfoVista VistaPortal Web Application, finds its
2323
version and performs login brute force to identify valid credentials.

modules/auxiliary/scanner/http/rfcode_reader_enum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
1616

1717
def initialize(info={})
1818
super(update_info(info,
19-
'Name' => 'RFCode Reader Web Interface Login Utility',
19+
'Name' => 'RFCode Reader Web Interface Login / Bruteforce Utility',
2020
'Description' => %{
2121
This module simply attempts to login to a RFCode Reader web interface.
2222
Please note that by default there is no authentication. In such a case, password brute force will not be performed.

modules/exploits/windows/browser/java_ws_double_quote.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,11 @@ def initialize(info = {})
2828
an attacker can execute arbitrary code in the context of a browser user.
2929
This flaw was fixed in Oct. 2012 and affects JRE <= 1.6.35 and <= 1.7.07.
3030
31-
In order for this module to work, it must be ran as root on a server that
32-
does not serve SMB. Additionally, the target host must have the WebClient
33-
service (WebDAV Mini-Redirector) enabled. Alternatively an UNC path containing
34-
a jvm.dll can be specified with an own SMB server.
31+
In order for this module to work, it must be run as root on a server that
32+
does not serve SMB (In most cases, this means non-Windows hosts). Additionally,
33+
the target host must have the WebClient service (WebDAV Mini-Redirector) enabled.
34+
Alternatively, a UNC path containing a jvm.dll can be specified, bypassing
35+
the Windows limitation for the Metasploit host.
3536
},
3637
'Author' =>
3738
[

0 commit comments

Comments
 (0)