Skip to content

Commit 6b15a07

Browse files
author
Tod Beardsley
committed
Update for grammar in descriptions on new modules.
1 parent 5b4890f commit 6b15a07

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

modules/exploits/osx/local/sudo_password_bypass.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ def initialize(info={})
3030
super(update_info(info,
3131
'Name' => 'Mac OS X Sudo Password Bypass',
3232
'Description' => %q{
33-
Gains a session with root permissions on versions of OS X with
33+
This module gains a session with root permissions on versions of OS X with
3434
sudo binary vulnerable to CVE-2013-1775. Tested working on Mac OS 10.7-10.8.4,
3535
and possibly lower versions.
3636
@@ -39,8 +39,8 @@ def initialize(info={})
3939
user has ever run the "sudo" command, it is possible to become the super
4040
user by running `sudo -k` and then resetting the system clock to 01-01-1970.
4141
42-
Fails silently if the user is not an admin or if the user has never
43-
ran the sudo command.
42+
This module will fail silently if the user is not an admin or if the user has never
43+
run the sudo command.
4444
},
4545
'License' => MSF_LICENSE,
4646
'Author' =>

modules/exploits/unix/webapp/graphite_pickle_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
'Description' => %q{
1919
This module exploits a remote code execution vulnerability in the pickle
2020
handling of the rendering code in the Graphite Web project between version
21-
0.9.5 and 0.9.10(both included).
21+
0.9.5 and 0.9.10 (both included).
2222
},
2323
'Author' =>
2424
[
@@ -77,4 +77,4 @@ def exploit
7777
'data' => data
7878
})
7979
end
80-
end
80+
end

modules/exploits/windows/http/oracle_endeca_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize
2020
This module exploits a command injection vulnerability on the Oracle Endeca
2121
Server 7.4.0. The vulnerability exists on the createDataStore method from the
2222
controlSoapBinding web service. The vulnerable method only exists on the 7.4.0
23-
branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection
23+
branch and isn't available on the 7.5.5.1 branch. In addition, the injection
2424
has been found to be Windows specific. This module has been tested successfully
2525
on Endeca Server 7.4.0.787 over Windows 2008 R2 (64 bits).
2626
},

0 commit comments

Comments
 (0)