Skip to content

Commit 9045eb0

Browse files
author
Tod Beardsley
committed
Various title and description updates
1 parent 9bb9f8b commit 9045eb0

File tree

5 files changed

+9
-8
lines changed

5 files changed

+9
-8
lines changed

modules/auxiliary/dos/http/nodejs_pipelining.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Node.js HTTP Pipelining DoS',
16+
'Name' => 'Node.js HTTP Pipelining Denial of Service',
1717
'Description' => %q{
18-
This module exploits a DoS in the HTTP parser of Node.js versions
18+
This module exploits a Denial of Service (DoS) condition in the HTTP parser of Node.js versions
1919
released before 0.10.21 and 0.8.26. The attack sends many pipelined
2020
HTTP requests on a single connection, which causes unbounded memory
2121
allocation when the client does not read the responses.

modules/auxiliary/scanner/http/jenkins_enum.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,10 @@ class Metasploit3 < Msf::Auxiliary
1919

2020
def initialize(info = {})
2121
super(update_info(info,
22-
'Name' => 'Jenkins Vulnerability Scanner',
22+
'Name' => 'Jenkins Enumeration',
2323
'Description' => %q{
24-
This module scans a Jenkins installation for a few vulnerabilities.
24+
This module enumerates a remote Jenkins installation in an unauthenticated manner, including
25+
host operating system and and Jenkins installation details.
2526
},
2627
'Author' => 'Jeff McCutchan',
2728
'License' => MSF_LICENSE

modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'D-Link DIR-605L Captcha Handling Buffer Overflow',
1818
'Description' => %q{
19-
This module exploits an anonymous remote code execution on D-Link DIR-605L routers. The
19+
This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
2020
vulnerability exists while handling user supplied captcha information, and is due to the
2121
insecure usage of sprintf on the getAuthCode() function. This module has been tested
2222
successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.

modules/exploits/osx/local/persistence.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ def initialize(info={})
1919
super( update_info( info,
2020
'Name' => 'Mac OS X Persistent Payload Installer',
2121
'Description' => %q{
22-
This module provides a persistence boot payload by creating a plist entry
22+
This module provides a persistent boot payload by creating a plist entry
2323
in current user's ~/Library/LaunchAgents directory. Whenever the user logs in,
24-
the LaunchAgent will be invoked and our dropped payload will run.
24+
the LaunchAgent will be invoked and this dropped payload will run.
2525
},
2626
'License' => MSF_LICENSE,
2727
'Author' => [ "Marcin 'Icewall' Noga <marcin[at]icewall.pl>", "joev" ],

modules/exploits/windows/emc/replication_manager_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a remote command-injection vulnerability in EMC Replication Manager
1919
client (irccd.exe). By sending a specially crafted message invoking RunProgram function an
20-
attacker may be able to execute arbitrary code commands with SYSTEM privileges. Affected
20+
attacker may be able to execute arbitrary commands with SYSTEM privileges. Affected
2121
products are EMC Replication Manager < 5.3. This module has been successfully tested
2222
against EMC Replication Manager 5.2.1 on XP/W2003. EMC Networker Module for Microsoft
2323
Applications 2.1 and 2.2 may be vulnerable too although this module have not been tested

0 commit comments

Comments
 (0)