File tree Expand file tree Collapse file tree 2 files changed +3
-3
lines changed Expand file tree Collapse file tree 2 files changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -11,8 +11,8 @@ def initialize(info = {})
11
11
super ( update_info ( info ,
12
12
'Name' => 'InstantCMS 1.6 Remote PHP Code Execution' ,
13
13
'Description' => %q{
14
- This module exploits an arbitrary php command execution vulnerability, because of a
15
- dangerous use of eval(), in InstantCMS versions 1.6.
14
+ This module exploits an arbitrary PHP command execution vulnerability because of a
15
+ dangerous use of eval() in InstantCMS in versions 1.6 and prior .
16
16
} ,
17
17
'Author' =>
18
18
[
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ def initialize(info = {})
17
17
'Name' => 'ABBS Audio Media Player .LST Buffer Overflow' ,
18
18
'Description' => %q{
19
19
This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability
20
- occurs when adding an .lst, allowing arbitrary code execution with the privileges
20
+ occurs when adding a specially crafted .lst file , allowing arbitrary code execution with the privileges
21
21
of the user running the application . This module has been tested successfully on
22
22
ABBS Audio Media Player 3.1 over Windows XP SP3 and Windows 7 SP1.
23
23
} ,
You can’t perform that action at this time.
0 commit comments