Skip to content

Commit 8d7396d

Browse files
author
Tod Beardsley
committed
Minor description changes on new modules
1 parent 0acdc32 commit 8d7396d

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

modules/exploits/unix/webapp/instantcms_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ def initialize(info = {})
1111
super(update_info(info,
1212
'Name' => 'InstantCMS 1.6 Remote PHP Code Execution',
1313
'Description' => %q{
14-
This module exploits an arbitrary php command execution vulnerability, because of a
15-
dangerous use of eval(), in InstantCMS versions 1.6.
14+
This module exploits an arbitrary PHP command execution vulnerability because of a
15+
dangerous use of eval() in InstantCMS in versions 1.6 and prior.
1616
},
1717
'Author' =>
1818
[

modules/exploits/windows/fileformat/abbs_amp_lst.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
'Name' => 'ABBS Audio Media Player .LST Buffer Overflow',
1818
'Description' => %q{
1919
This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability
20-
occurs when adding an .lst, allowing arbitrary code execution with the privileges
20+
occurs when adding a specially crafted .lst file, allowing arbitrary code execution with the privileges
2121
of the user running the application . This module has been tested successfully on
2222
ABBS Audio Media Player 3.1 over Windows XP SP3 and Windows 7 SP1.
2323
},

0 commit comments

Comments
 (0)