Skip to content

Commit 86db2a5

Browse files
author
Tod Beardsley
committed
Land rapid7#8888 from @h00die, with two extra fixes
Fixes spelling and grammar in a bunch of modules. More to come!
2 parents 3c1abe6 + 8a045e6 commit 86db2a5

File tree

140 files changed

+240
-156
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+240
-156
lines changed

modules/auxiliary/admin/backupexec/registry.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Description' => %q{
1414
This modules exploits a remote registry access flaw in the BackupExec Windows
1515
Server RPC service. This vulnerability was discovered by Pedram Amini and is based
16-
on the NDR stub information information posted to openrce.org.
16+
on the NDR stub information posted to openrce.org.
1717
Please see the action list for the different attack modes.
1818
1919
},

modules/auxiliary/admin/http/intersil_pass_reset.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Intersil (Boa) HTTPd Basic Authentication Password Reset',
1212
'Description' => %q{
13-
The Intersil extention in the Boa HTTP Server 0.93.x - 0.94.11
13+
The Intersil extension in the Boa HTTP Server 0.93.x - 0.94.11
1414
allows basic authentication bypass when the user string is greater
1515
than 127 bytes long. The long string causes the password to be
1616
overwritten in memory, which enables the attacker to reset the

modules/auxiliary/admin/http/netgear_auth_download.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Description' => %q{
1414
Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems.
1515
The application has a file download vulnerability that can be exploited by an
16-
authenticated remote attacker to download any file in the system..
16+
authenticated remote attacker to download any file in the system.
1717
This module has been tested with versions 1.5.0.2, 1.4.0.17 and 1.1.0.13.
1818
},
1919
'Author' =>

modules/auxiliary/admin/http/openbravo_xxe.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
local files. This allows the user to read any files from the FS as the
1919
user Openbravo is running as (generally not root).
2020
21-
This module was tested againt Openbravo ERP version 3.0MP25 and 2.50MP6.
21+
This module was tested against Openbravo ERP version 3.0MP25 and 2.50MP6.
2222
},
2323
'Author' =>
2424
[

modules/auxiliary/admin/http/tomcat_utf8_traversal.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ def initialize
1212
super(
1313
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
1414
'Description' => %q{
15-
This module tests whether a directory traversal vulnerablity is present
15+
This module tests whether a directory traversal vulnerability is present
1616
in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0
1717
- 6.0.16 under specific and non-default installations. The connector must have
1818
allowLinking set to true and URIEncoding set to UTF-8. Furthermore, the

modules/auxiliary/admin/http/webnms_cred_disclosure.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ def initialize(info = {})
1414
'Name' => 'WebNMS Framework Server Credential Disclosure',
1515
'Description' => %q(
1616
This module abuses two vulnerabilities in WebNMS Framework Server 5.2 to extract
17-
all user credentials. The first vulnerability is a unauthenticated file download
17+
all user credentials. The first vulnerability is an unauthenticated file download
1818
in the FetchFile servlet, which is used to download the file containing the user
19-
credentials. The second vulnerability is that the the passwords in the file are
19+
credentials. The second vulnerability is that the passwords in the file are
2020
obfuscated with a very weak algorithm which can be easily reversed.
2121
This module has been tested with WebNMS Framework Server 5.2 and 5.2 SP1 on
2222
Windows and Linux.

modules/auxiliary/admin/http/wp_easycart_privilege_escalation.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ def initialize(info = {})
1212
'Name' => 'WordPress WP EasyCart Plugin Privilege Escalation',
1313
'Description' => %q{
1414
The WordPress WP EasyCart plugin from version 1.1.30 to 3.0.20 allows authenticated
15-
users of any user level to set any system option via a lack of validation in the
15+
users of any user level to set any system option via a lack of validation in the
1616
ec_ajax_update_option and ec_ajax_clear_all_taxrates functions located in
1717
/inc/admin/admin_ajax_functions.php. The module first changes the admin e-mail address
1818
to prevent any notifications being sent to the actual administrator during the attack,

modules/auxiliary/admin/mssql/mssql_sql.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ def initialize(info = {})
1111
'Name' => 'Microsoft SQL Server Generic Query',
1212
'Description' => %q{
1313
This module will allow for simple SQL statements to be executed against a
14-
MSSQL/MSDE instance given the appropiate credentials.
14+
MSSQL/MSDE instance given the appropriate credentials.
1515
},
1616
'Author' => [ 'tebo <tebo[at]attackresearch.com>' ],
1717
'License' => MSF_LICENSE,

modules/auxiliary/admin/mssql/mssql_sql_file.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ def initialize(info = {})
1212
'Description' => %q{
1313
This module will allow for multiple SQL queries contained within a specified
1414
file to be executed against a Microsoft SQL (MSSQL) Server instance, given
15-
the appropiate credentials.
15+
the appropriate credentials.
1616
},
1717
'Author' => [ 'j0hn__f : <jf[at]tinternet.org.uk>' ],
1818
'License' => MSF_LICENSE

modules/auxiliary/admin/oracle/oracle_sql.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ def initialize(info = {})
1111
'Name' => 'Oracle SQL Generic Query',
1212
'Description' => %q{
1313
This module allows for simple SQL statements to be executed
14-
against a Oracle instance given the appropriate credentials
14+
against an Oracle instance given the appropriate credentials
1515
and sid.
1616
},
1717
'Author' => [ 'MC' ],

0 commit comments

Comments
 (0)