Skip to content

Commit 5309f2e

Browse files
author
Brent Cook
committed
endpoints, not end points
1 parent 50c918f commit 5309f2e

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

documentation/modules/exploit/unix/misc/psh_auth_bypass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Vulnerable Application
22

3-
This module exploits the Polycom HDX Video End Points with software <= 3.0.5.
3+
This module exploits the Polycom HDX video endpoints with software <= 3.0.5.
44
It was tested on a Polycom HDX 7000 running software version 3.0.3. Telnet port
55
23 should be accessible, as it is with the factory default configuration.
66

modules/exploits/unix/misc/psh_auth_bypass.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ def initialize(info = {})
2424
'DisclosureDate' => 'Jan 18 2013',
2525
'Description' => %q(
2626
The login component of the Polycom Command Shell on Polycom HDX
27-
Video End Points running software versions 3.0.5 and earlier
27+
video endpints, running software versions 3.0.5 and earlier,
2828
is vulnerable to an authorization bypass when simultaneous
2929
connections are made to the service, allowing remote network
3030
attackers to gain access to a sandboxed telnet prompt without

0 commit comments

Comments
 (0)