File tree Expand file tree Collapse file tree 5 files changed +9
-8
lines changed Expand file tree Collapse file tree 5 files changed +9
-8
lines changed Original file line number Diff line number Diff line change @@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'Node.js HTTP Pipelining DoS ' ,
16
+ 'Name' => 'Node.js HTTP Pipelining Denial of Service ' ,
17
17
'Description' => %q{
18
- This module exploits a DoS in the HTTP parser of Node.js versions
18
+ This module exploits a Denial of Service ( DoS) condition in the HTTP parser of Node.js versions
19
19
released before 0.10.21 and 0.8.26. The attack sends many pipelined
20
20
HTTP requests on a single connection, which causes unbounded memory
21
21
allocation when the client does not read the responses.
Original file line number Diff line number Diff line change @@ -19,9 +19,10 @@ class Metasploit3 < Msf::Auxiliary
19
19
20
20
def initialize ( info = { } )
21
21
super ( update_info ( info ,
22
- 'Name' => 'Jenkins Vulnerability Scanner ' ,
22
+ 'Name' => 'Jenkins Enumeration ' ,
23
23
'Description' => %q{
24
- This module scans a Jenkins installation for a few vulnerabilities.
24
+ This module enumerates a remote Jenkins installation in an unauthenticated manner, including
25
+ host operating system and and Jenkins installation details.
25
26
} ,
26
27
'Author' => 'Jeff McCutchan' ,
27
28
'License' => MSF_LICENSE
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ def initialize(info = {})
16
16
super ( update_info ( info ,
17
17
'Name' => 'D-Link DIR-605L Captcha Handling Buffer Overflow' ,
18
18
'Description' => %q{
19
- This module exploits an anonymous remote code execution on D-Link DIR-605L routers. The
19
+ This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
20
20
vulnerability exists while handling user supplied captcha information, and is due to the
21
21
insecure usage of sprintf on the getAuthCode() function. This module has been tested
22
22
successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.
Original file line number Diff line number Diff line change @@ -19,9 +19,9 @@ def initialize(info={})
19
19
super ( update_info ( info ,
20
20
'Name' => 'Mac OS X Persistent Payload Installer' ,
21
21
'Description' => %q{
22
- This module provides a persistence boot payload by creating a plist entry
22
+ This module provides a persistent boot payload by creating a plist entry
23
23
in current user's ~/Library/LaunchAgents directory. Whenever the user logs in,
24
- the LaunchAgent will be invoked and our dropped payload will run.
24
+ the LaunchAgent will be invoked and this dropped payload will run.
25
25
} ,
26
26
'License' => MSF_LICENSE ,
27
27
'Author' => [ "Marcin 'Icewall' Noga <marcin[at]icewall.pl>" , "joev" ] ,
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ def initialize(info = {})
17
17
'Description' => %q{
18
18
This module exploits a remote command-injection vulnerability in EMC Replication Manager
19
19
client (irccd.exe). By sending a specially crafted message invoking RunProgram function an
20
- attacker may be able to execute arbitrary code commands with SYSTEM privileges. Affected
20
+ attacker may be able to execute arbitrary commands with SYSTEM privileges. Affected
21
21
products are EMC Replication Manager < 5.3. This module has been successfully tested
22
22
against EMC Replication Manager 5.2.1 on XP/W2003. EMC Networker Module for Microsoft
23
23
Applications 2.1 and 2.2 may be vulnerable too although this module have not been tested
You can’t perform that action at this time.
0 commit comments