Skip to content

Commit 51b96cb

Browse files
author
Tod Beardsley
committed
Cosmetic title/desc updates
1 parent 4f0fbaa commit 51b96cb

File tree

5 files changed

+14
-11
lines changed

5 files changed

+14
-11
lines changed

modules/auxiliary/gather/xerox_pwd_extract.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info={})
1414
super(update_info(info,
15-
'Name' => 'Xerox Administrator Console Password Extract',
16-
'Description' => %{
17-
This module will extract the management consoles admin password from the Xerox file system
18-
using firmware bootstrap injection.
15+
'Name' => 'Xerox Administrator Console Password Extractor',
16+
'Description' => %q{
17+
This module will extract the management console's admin password from the
18+
Xerox file system using firmware bootstrap injection.
1919
},
2020
'Author' =>
2121
[

modules/auxiliary/gather/xerox_workcentre_5xxx_ldap.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ class Metasploit3 < Msf::Auxiliary
1414
def initialize(info={})
1515
super(update_info(info,
1616
'Name' => 'Xerox Workcentre 5735 LDAP Service Redential Extractor',
17-
'Description' => %{
18-
This module extract the printers LDAP user and password from Xerox workcentre 5735.
17+
'Description' => %q{
18+
This module extract the printer's LDAP username and password from Xerox Workcentre 5735.
1919
},
2020
'Author' =>
2121
[

modules/auxiliary/scanner/http/buffalo_login.rb

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,10 @@ class Metasploit3 < Msf::Auxiliary
1616
def initialize
1717
super(
1818
'Name' => 'Buffalo NAS Login Utility',
19-
'Description' => 'This module simply attempts to login to a Buffalo NAS instance using a specific user/pass. It is confirmed to work with 1.68',
19+
'Description' => %q{
20+
This module simply attempts to login to a Buffalo NAS instance using a specific
21+
username and password. It has been confirmed to work on version 1.68
22+
},
2023
'Author' => [ 'Nicholas Starke <starke.nicholas[at]gmail.com>' ],
2124
'License' => MSF_LICENSE
2225
)

modules/exploits/multi/http/cups_bash_env_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ def initialize(info = {})
1313
super(update_info(info,
1414
'Name' => 'CUPS Filter Bash Environment Variable Code Injection',
1515
'Description' => %q{
16-
This module exploits a post-auth code injection in specially crafted
17-
environment variables in Bash, specifically targeting CUPS filters
18-
through the PRINTER_INFO and PRINTER_LOCATION variables by default.
16+
This module exploits Shellshock, a post-authentication code injection vulnerability
17+
in specially crafted environment variables in Bash. It specifically targets
18+
CUPS filters through the PRINTER_INFO and PRINTER_LOCATION variables by default.
1919
},
2020
'Author' => [
2121
'Stephane Chazelas', # Vulnerability discovery

modules/exploits/unix/misc/xerox_mfp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313
def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'Xerox Multifunction Printers (MFP) "Patch" DLM Vulnerability',
16-
'Description' => %{
16+
'Description' => %q{
1717
This module exploits a vulnerability found in Xerox Multifunction Printers (MFP). By
1818
supplying a modified Dynamic Loadable Module (DLM), it is possible to execute arbitrary
1919
commands under root priviages.

0 commit comments

Comments
 (0)