Skip to content

Commit a815d92

Browse files
committed
Merge pull request rapid7#2245 from todb-r7/grammar-and-such
Trivial grammar and word choice fixes for modules
2 parents 809b429 + ca31380 commit a815d92

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

modules/auxiliary/scanner/http/cisco_ironport_enum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize(info={})
2020
'Name' => 'Cisco Ironport Bruteforce Login Utility',
2121
'Description' => %{
2222
This module scans for Cisco Ironport SMA, WSA and ESA web login portals, finds AsyncOS
23-
version and performs login brute force to identify valid credentials.
23+
versions, and performs login brute force to identify valid credentials.
2424
},
2525
'Author' =>
2626
[

modules/exploits/multi/browser/java_storeimagearray.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ def initialize( info = {} )
2121
'Name' => 'Java storeImageArray() Invalid Array Indexing Vulnerability',
2222
'Description' => %q{
2323
This module abuses an Invalid Array Indexing Vulnerability on the
24-
static function storeImageArray() function in order to produce a
25-
memory corruption and finally escape the Java Sandbox. The vulnerability
24+
static function storeImageArray() function in order to cause a
25+
memory corruption and escape the Java Sandbox. The vulnerability
2626
affects Java version 7u21 and earlier. The module, which doesn't bypass
2727
click2play, has been tested successfully on Java 7u21 on Windows and
2828
Linux systems.
@@ -154,4 +154,4 @@ def generate_jar(cli)
154154
return jar.pack
155155
end
156156

157-
end
157+
end

modules/exploits/windows/http/cogent_datahub_request_headers_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
'Name' => 'Cogent DataHub HTTP Server Buffer Overflow',
1919
'Description' => %q{
2020
This module exploits a stack based buffer overflow on Cogent DataHub 7.3.0. The
21-
vulnerability exists in the HTTP server - while handling HTTP headers, a
21+
vulnerability exists in the HTTP server. While handling HTTP headers, a
2222
strncpy() function is used in a dangerous way. This module has been tested
2323
successfully on Cogent DataHub 7.3.0 (Demo) on Windows XP SP3.
2424
},

modules/exploits/windows/http/intrasrv_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info={})
1919
'Description' => %q{
2020
This module exploits a boundary condition error in Intrasrv Simple Web
2121
Server 1.0. The web interface does not validate the boundaries of an
22-
HTTP request string prior to copying the data to an insufficiently large
22+
HTTP request string prior to copying the data to an insufficiently sized
2323
buffer. Successful exploitation leads to arbitrary remote code execution
2424
in the context of the application.
2525
},

modules/exploits/windows/http/ultraminihttp_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info={})
1616
super(update_info(info,
1717
'Name' => "Ultra Mini HTTPD Stack Buffer Overflow",
1818
'Description' => %q{
19-
This module exploits a stack based buffer overflow in Ultra Mini HTTPD 1.21
19+
This module exploits a stack based buffer overflow in Ultra Mini HTTPD 1.21,
2020
allowing remote attackers to execute arbitrary code via a long resource name in an HTTP
2121
request.
2222
},

0 commit comments

Comments
 (0)