Skip to content

Commit 4cf6826

Browse files
author
Tod Beardsley
committed
New module title and description fixes
1 parent 116e2bb commit 4cf6826

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

modules/auxiliary/dos/misc/memcached.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ def initialize(info = {})
1818
super(update_info(info,
1919
'Name' => 'Memcached Remote Denial of Service',
2020
'Description' => %q{
21-
This module send specially-crafted packet causing a
22-
segmentation fault in memcached v1.4.15 or earlier versions.
21+
This module sends a specially-crafted packet to cause a
22+
segmentation fault in memcached v1.4.15 or earlier versions.
2323
},
2424

2525
'References' =>

modules/auxiliary/scanner/couchdb/couchdb_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info={})
1818
super(update_info(info,
1919
'Name' => 'CouchDB Login Utility',
2020
'Description' => %{
21-
This module will test CouchDB logins on a range of
21+
This module tests CouchDB logins on a range of
2222
machines and report successful logins.
2323
},
2424
'Author' =>

modules/exploits/multi/http/struts_include_params.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,10 @@ def initialize(info = {})
2121
This module exploits a remote command execution vulnerability in Apache Struts
2222
versions < 2.3.14.2. A specifically crafted request parameter can be used to inject
2323
arbitrary OGNL code into the stack bypassing Struts and OGNL library protections.
24-
When targeting an action which requires interaction through GET the payload should
25-
be split having into account the uri limits. In this case, if the rendered jsp has
26-
more than one point of injection, it could result in payload corruption. It should
27-
happen only when the payload is larger than the uri length.
24+
When targeting an action which requires interaction through GET, the payload should
25+
be split, taking into account the URI limits. In this case, if the rendered JSP has
26+
more than one point of injection, it could result in payload corruption. This should
27+
happen only when the payload is larger than the URI length.
2828
},
2929
'Author' =>
3030
[

modules/exploits/windows/misc/lianja_db_net.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'Lianja SQL 1.0.0RC5.1 db_netserver Stack Buffer Overflow',
1818
'Description' => %q{
19-
This module exploits a stack buffer overflow in the db_netserver process which
19+
This module exploits a stack buffer overflow in the db_netserver process, which
2020
is spawned by the Lianja SQL server. The issue is fixed in Lianja SQL 1.0.0RC5.2.
2121
},
2222
'Author' => 'Spencer McIntyre',

0 commit comments

Comments
 (0)