Skip to content

Commit a404291

Browse files
committed
40% done
1 parent bd7ea1f commit a404291

File tree

64 files changed

+72
-72
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+72
-72
lines changed

modules/auxiliary/spoof/dns/compare_results.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
This module can be used to determine differences
1616
in the cache entries between two DNS servers. This is
1717
primarily useful for detecting cache poisoning attacks,
18-
but can also be used to detect geo-location loadbalancing.
18+
but can also be used to detect geo-location load balancing.
1919
},
2020
'Author' => [ 'hdm' ],
2121
'License' => MSF_LICENSE,

modules/auxiliary/sqli/oracle/dbms_cdc_subscribe_activate_subscription.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_SUBSCRIBE.ACTIVATE_SUBSCRIPTION',
1212
'Description' => %q{
13-
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
13+
This module will escalate an Oracle DB user to DBA by exploiting a sql injection
1414
bug in the SYS.DBMS_CDC_SUBSCRIBE.ACTIVATE_SUBSCRIPTION package/function.
1515
This vulnerability affects to Oracle Database Server 9i up to 9.2.0.5 and
1616
10g up to 10.1.0.4.

modules/auxiliary/sqli/oracle/dbms_export_extension.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via DBMS_EXPORT_EXTENSION',
1212
'Description' => %q{
13-
This module will escalate a Oracle DB user to DBA by exploiting an
13+
This module will escalate an Oracle DB user to DBA by exploiting a
1414
sql injection bug in the DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA package.
1515
1616
Note: This module has been tested against 9i, 10gR1 and 10gR2.

modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML',
1212
'Description' => %q{
13-
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
13+
This module will escalate an Oracle DB user to DBA by exploiting a sql injection
1414
bug in the SYS.DBMS_METADATA.GET_GRANTED_XML package/function.
1515
},
1616
'Author' => [ 'MC' ],

modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_XML',
1212
'Description' => %q{
13-
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
13+
This module will escalate an Oracle DB user to DBA by exploiting a sql injection
1414
bug in the SYS.DBMS_METADATA.GET_XML package/function.
1515
},
1616
'Author' => [ 'MC' ],

modules/auxiliary/sqli/oracle/droptable_trigger.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger',
1212
'Description' => %q{
13-
This module will escalate a Oracle DB user to MDSYS by exploiting an sql injection bug in
13+
This module will escalate an Oracle DB user to MDSYS by exploiting a sql injection bug in
1414
the MDSYS.SDO_TOPO_DROP_FTBL trigger. After that exploit escalate user to DBA using "CREATE ANY TRIGGER" privilege
1515
given to MDSYS user by creating evil trigger in system scheme (2-stage attack).
1616
},

modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method',
1212
'Description' => %q{
13-
This module will escalate a Oracle DB user to DBA by exploiting
14-
an sql injection bug in the SYS.LT.FINDRICSET package via Evil
13+
This module will escalate an Oracle DB user to DBA by exploiting
14+
a sql injection bug in the SYS.LT.FINDRICSET package via Evil
1515
Cursor technique. Tested on oracle 10.1.0.3.0 -- should work on
1616
thru 10.1.0.5.0 and supposedly on 11g. Fixed with Oracle Critical
1717
Patch update October 2007.

modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via SYS.LT.MERGEWORKSPACE',
1212
'Description' => %q{
13-
This module exploits an sql injection flaw in the MERGEWORKSPACE
13+
This module exploits a sql injection flaw in the MERGEWORKSPACE
1414
procedure of the PL/SQL package SYS.LT. Any user with execute
1515
privilege on the vulnerable package can exploit this vulnerability.
1616
},

modules/auxiliary/sqli/oracle/lt_removeworkspace.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via SYS.LT.REMOVEWORKSPACE',
1212
'Description' => %q{
13-
This module exploits an sql injection flaw in the REMOVEWORKSPACE
13+
This module exploits a sql injection flaw in the REMOVEWORKSPACE
1414
procedure of the PL/SQL package SYS.LT. Any user with execute
1515
privilege on the vulnerable package can exploit this vulnerability.
1616
},

modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ def initialize(info = {})
1010
super(update_info(info,
1111
'Name' => 'Oracle DB SQL Injection via SYS.LT.ROLLBACKWORKSPACE',
1212
'Description' => %q{
13-
This module exploits an sql injection flaw in the ROLLBACKWORKSPACE
13+
This module exploits a sql injection flaw in the ROLLBACKWORKSPACE
1414
procedure of the PL/SQL package SYS.LT. Any user with execute
1515
privilege on the vulnerable package can exploit this vulnerability.
1616
},

0 commit comments

Comments
 (0)