File tree Expand file tree Collapse file tree 5 files changed +7
-7
lines changed Expand file tree Collapse file tree 5 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ def initialize(info={})
20
20
'Name' => 'Cisco Ironport Bruteforce Login Utility' ,
21
21
'Description' => %{
22
22
This module scans for Cisco Ironport SMA, WSA and ESA web login portals, finds AsyncOS
23
- version and performs login brute force to identify valid credentials.
23
+ versions, and performs login brute force to identify valid credentials.
24
24
} ,
25
25
'Author' =>
26
26
[
Original file line number Diff line number Diff line change @@ -21,8 +21,8 @@ def initialize( info = {} )
21
21
'Name' => 'Java storeImageArray() Invalid Array Indexing Vulnerability' ,
22
22
'Description' => %q{
23
23
This module abuses an Invalid Array Indexing Vulnerability on the
24
- static function storeImageArray() function in order to produce a
25
- memory corruption and finally escape the Java Sandbox. The vulnerability
24
+ static function storeImageArray() function in order to cause a
25
+ memory corruption and escape the Java Sandbox. The vulnerability
26
26
affects Java version 7u21 and earlier. The module, which doesn't bypass
27
27
click2play, has been tested successfully on Java 7u21 on Windows and
28
28
Linux systems.
@@ -154,4 +154,4 @@ def generate_jar(cli)
154
154
return jar . pack
155
155
end
156
156
157
- end
157
+ end
Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ def initialize(info = {})
18
18
'Name' => 'Cogent DataHub HTTP Server Buffer Overflow' ,
19
19
'Description' => %q{
20
20
This module exploits a stack based buffer overflow on Cogent DataHub 7.3.0. The
21
- vulnerability exists in the HTTP server - while handling HTTP headers, a
21
+ vulnerability exists in the HTTP server. While handling HTTP headers, a
22
22
strncpy() function is used in a dangerous way. This module has been tested
23
23
successfully on Cogent DataHub 7.3.0 (Demo) on Windows XP SP3.
24
24
} ,
Original file line number Diff line number Diff line change @@ -19,7 +19,7 @@ def initialize(info={})
19
19
'Description' => %q{
20
20
This module exploits a boundary condition error in Intrasrv Simple Web
21
21
Server 1.0. The web interface does not validate the boundaries of an
22
- HTTP request string prior to copying the data to an insufficiently large
22
+ HTTP request string prior to copying the data to an insufficiently sized
23
23
buffer. Successful exploitation leads to arbitrary remote code execution
24
24
in the context of the application.
25
25
} ,
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ def initialize(info={})
16
16
super ( update_info ( info ,
17
17
'Name' => "Ultra Mini HTTPD Stack Buffer Overflow" ,
18
18
'Description' => %q{
19
- This module exploits a stack based buffer overflow in Ultra Mini HTTPD 1.21
19
+ This module exploits a stack based buffer overflow in Ultra Mini HTTPD 1.21,
20
20
allowing remote attackers to execute arbitrary code via a long resource name in an HTTP
21
21
request.
22
22
} ,
You can’t perform that action at this time.
0 commit comments