Skip to content

Commit 7339658

Browse files
committed
224 pages of spelling issues left
1 parent 6289cc0 commit 7339658

13 files changed

+15
-15
lines changed

modules/exploits/windows/browser/ms06_013_createtextrange.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Name' => 'MS06-013 Microsoft Internet Explorer createTextRange() Code Execution',
1414
'Description' => %q{
1515
This module exploits a code execution vulnerability in Microsoft Internet Explorer.
16-
Both IE6 and IE7 (Beta 2) are vulnerable. It will corrupt memory in a way, which, under
16+
Both IE6 and IE7 (Beta 2) are vulnerable. It will corrupt memory in a way, which, under
1717
certain circumstances, can lead to an invalid/corrupt table pointer dereference. EIP will point
1818
to a very remote, non-existent memory location. This module is the result of merging three
1919
different exploit submissions and has only been reliably tested against Windows XP SP2.

modules/exploits/windows/browser/ms06_071_xml_core.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Name' => 'MS06-071 Microsoft Internet Explorer XML Core Services HTTP Request Handling',
1414
'Description' => %q{
1515
This module exploits a code execution vulnerability in Microsoft XML Core Services which
16-
exists in the XMLHTTP ActiveX control. This module is the modifed version of
16+
exists in the XMLHTTP ActiveX control. This module is the modified version of
1717
http://www.milw0rm.com/exploits/2743 - credit to str0ke. This module has been successfully
1818
tested on Windows 2000 SP4, Windows XP SP2, Windows 2003 Server SP0 with IE6
1919
+ Microsoft XML Core Services 4.0 SP2.

modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
'Description' => %q{
1919
This module exploits a code execution vulnerability that occurs when a user
2020
presses F1 on MessageBox originated from VBscript within a web page. When the
21-
user hits F1, the MessageBox help functionaility will attempt to load and use
21+
user hits F1, the MessageBox help functionality will attempt to load and use
2222
a HLP file from an SMB or WebDAV (if the WebDAV redirector is enabled) server.
2323
2424
This particular version of the exploit implements a WebDAV server that will

modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ def initialize(info = {})
1212
super(update_info(info,
1313
'Name' => 'MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow',
1414
'Description' => %q{
15-
This module exploits a buffer overlow in l3codecx.ax while processing a
15+
This module exploits a buffer overflow in l3codecx.ax while processing a
1616
AVI files with MPEG Layer-3 audio contents. The overflow only allows to overwrite
1717
with 0's so the three least significant bytes of EIP saved on stack are
1818
overwritten and shellcode is mapped using the .NET DLL memory technique pioneered

modules/exploits/windows/browser/ms10_090_ie_css_clip.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,12 @@ def initialize(info = {})
2222
super(update_info(info,
2323
'Name' => 'MS10-090 Microsoft Internet Explorer CSS SetUserClip Memory Corruption',
2424
'Description' => %q{
25-
Thie module exploits a memory corruption vulnerability within Microsoft's
25+
This module exploits a memory corruption vulnerability within Microsoft's
2626
HTML engine (mshtml). When parsing an HTML page containing a specially
2727
crafted CSS tag, memory corruption occurs that can lead arbitrary code
2828
execution.
2929
30-
It seems like Microsoft code inadvertantly increments a vtable pointer to
30+
It seems like Microsoft code inadvertently increments a vtable pointer to
3131
point to an unaligned address within the vtable's function pointers. This
3232
leads to the program counter being set to the address determined by the
3333
address "[vtable+0x30+1]". The particular address depends on the exact

modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ def initialize(info={})
3737
handler we want to abuse - the "onpropertychange" event. Since the CBlockElement is a child
3838
of CTextArea, if we do a node swap of CBlockElement in "onselect", this will trigger
3939
"onpropertychange". During "onpropertychange" event handling, a free of the CDisplayPointer
40-
object can be forced by using an "Unslect" (other approaches also apply), but a reference
40+
object can be forced by using an "Unselect" (other approaches also apply), but a reference
4141
of this freed memory will still be kept by CDoc::ScrollPointerIntoView, specifically after
4242
the CDoc::GetLineInfo call, because it is still trying to use that to update
4343
CDisplayPointer's position. When this invalid reference arrives in QIClassID, a crash

modules/exploits/windows/browser/nis2004_get.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Description' => %q{
1515
This module exploits a stack buffer overflow in the ISAlertDataCOM ActiveX
1616
Control (ISLAert.dll) provided by Symantec Norton Internet Security 2004.
17-
By sending a overly long string to the "Get()" method, an attacker may be
17+
By sending an overly long string to the "Get()" method, an attacker may be
1818
able to execute arbitrary code.
1919
},
2020
'License' => MSF_LICENSE,

modules/exploits/windows/browser/notes_handler_cmdinject.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ def initialize(info={})
1414
super(update_info(info,
1515
'Name' => "IBM Lotus Notes Client URL Handler Command Injection",
1616
'Description' => %q{
17-
This modules exploits a command injection vulnerability in the URL handler for
17+
This module exploits a command injection vulnerability in the URL handler for
1818
for the IBM Lotus Notes Client <= 8.5.3. The registered handler can be abused with
19-
an specially crafted notes:// URL to execute arbitrary commands with also arbitrary
19+
a specially crafted notes:// URL to execute arbitrary commands with also arbitrary
2020
arguments. This module has been tested successfully on Windows XP SP3 with IE8,
2121
Google Chrome 23.0.1271.97 m and IBM Lotus Notes Client 8.5.2.
2222
},

modules/exploits/windows/browser/oracle_dc_submittoexpress.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Description' => %q{
1515
This module exploits a stack buffer overflow in Oracle Document Capture 10g (10.1.3.5.0).
1616
Oracle Document Capture 10g comes bundled with a third party ActiveX control
17-
emsmtp.dll (6.0.1.0). When passing a overly long string to the method "SubmitToExpress"
17+
emsmtp.dll (6.0.1.0). When passing an overly long string to the method "SubmitToExpress"
1818
an attacker may be able to execute arbitrary code.
1919
},
2020
'License' => MSF_LICENSE,

modules/exploits/windows/browser/oracle_webcenter_checkoutandopen.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info={})
1313
super(update_info(info,
1414
'Name' => "Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution",
1515
'Description' => %q{
16-
This modules exploits a vulnerability found in the Oracle WebCenter Content
16+
This module exploits a vulnerability found in the Oracle WebCenter Content
1717
CheckOutAndOpenControl ActiveX. This vulnerability exists in openWebdav(), where
1818
user controlled input is used to call ShellExecuteExW(). This module abuses the
1919
control to execute an arbitrary HTA from a remote location. This module has been

0 commit comments

Comments
 (0)