Skip to content

Commit e8eeb78

Browse files
committed
Land rapid7#8960, spelling/grammar fixes part 3
2 parents d56fffc + 8de6fa7 commit e8eeb78

File tree

122 files changed

+147
-147
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

122 files changed

+147
-147
lines changed

modules/exploits/windows/browser/safari_xslt_output.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
rendering engine. It is possible to redirect the output of a XSLT
1919
transformation to an arbitrary file. The content of the created file must be
2020
ASCII or UTF-8. The destination path can be relative or absolute. This module
21-
has been tested on Safari and Maxthon. Code execution can be acheived by first
21+
has been tested on Safari and Maxthon. Code execution can be achieved by first
2222
uploading the payload to the remote machine in VBS format, and then upload a MOF
2323
file, which enables Windows Management Instrumentation service to execute the VBS.
2424
},

modules/exploits/windows/browser/teechart_pro.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ def initialize(info = {})
1212
super( update_info(info,
1313
'Name' => 'TeeChart Professional ActiveX Control Trusted Integer Dereference',
1414
'Description' => %q{
15-
This module exploits a integer overflow in TeeChart Pro ActiveX control. When
15+
This module exploits an integer overflow in TeeChart Pro ActiveX control. When
1616
sending an overly large/negative integer value to the AddSeries() property of
17-
TeeChart2010.ocx, the code will perform an arithemetic operation that wraps the
17+
TeeChart2010.ocx, the code will perform an arithmetic operation that wraps the
1818
value and is later directly trusted and called upon.
1919
2020
This module has been designed to bypass DEP only under IE8 with Java support. Multiple

modules/exploits/windows/browser/tom_sawyer_tsgetx71ex552.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ def initialize(info={})
2727
ActiveX control installed with Tom Sawyer GET Extension Factory due to an incorrect
2828
initialization under Internet Explorer.
2929
30-
While the Tom Sawyer GET Extension Factory is installed with some versions of VMware
30+
While the Tom Sawyer GET Extension Factory is installed with some versions of VMware
3131
Infrastructure Client, this module has been tested only with the versions installed
3232
with Embarcadero Technologies ER/Studio XE2 / Embarcadero Studio Portal 1.6. The ActiveX
3333
control tested is tsgetx71ex553.dll, version 5.5.3.238.

modules/exploits/windows/browser/webex_ucf_newobject.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Name' => 'WebEx UCF atucfobj.dll ActiveX NewObject Method Buffer Overflow',
1515
'Description' => %q{
1616
This module exploits a stack-based buffer overflow in WebEx's WebexUCFObject
17-
ActiveX Control. If an long string is passed to the 'NewObject' method, a stack-
17+
ActiveX Control. If a long string is passed to the 'NewObject' method, a stack-
1818
based buffer overflow will occur when copying attacker-supplied data using the
1919
sprintf function.
2020

modules/exploits/windows/browser/winamp_playlist_unc.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
'Name' => 'Winamp Playlist UNC Path Computer Name Overflow',
1717
'Description' => %q{
1818
This module exploits a vulnerability in the Winamp media player.
19-
This flaw is triggered when a audio file path is specified, inside a
19+
This flaw is triggered when an audio file path is specified, inside a
2020
playlist, that consists of a UNC path with a long computer name. This
2121
module delivers the playlist via the browser. This module has only
2222
been successfully tested on Winamp 5.11 and 5.12.

modules/exploits/windows/browser/winamp_ultravox.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
This module exploits a stack buffer overflow in Winamp 5.24. By
1616
sending an overly long artist tag, a remote attacker may
1717
be able to execute arbitrary code. This vulnerability can be
18-
exploited from the browser or the winamp client itself.
18+
exploited from the browser or the Winamp client itself.
1919
},
2020
'Author' => 'MC',
2121
'License' => MSF_LICENSE,

modules/exploits/windows/browser/windvd7_applicationtype.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
'Name' => 'WinDVD7 IASystemInfo.DLL ActiveX Control Buffer Overflow',
1515
'Description' => %q{
1616
This module exploits a stack buffer overflow in IASystemInfo.dll ActiveX
17-
control in InterVideo WinDVD 7. By sending a overly long string
17+
control in InterVideo WinDVD 7. By sending an overly long string
1818
to the "ApplicationType()" property, an attacker may be able to
1919
execute arbitrary code.
2020
},

modules/exploits/windows/browser/wmi_admintools.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ def initialize(info = {})
3232
opt-in to ASLR. As such, this module should be reliable on all Windows
3333
versions.
3434
35-
The WMI Adminsitrative Tools are a standalone download & install (linked in the
35+
The WMI Administrative Tools are a standalone download & install (linked in the
3636
references).
3737
3838
},

modules/exploits/windows/browser/x360_video_player_set_text_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info={})
1313
'Name' => "X360 VideoPlayer ActiveX Control Buffer Overflow",
1414
'Description' => %q{
1515
This module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the
16-
X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun
16+
X360 Software. By setting an overly long value to 'ConvertFile()', an attacker can overrun
1717
a .data buffer to bypass ASLR/DEP and finally execute arbitrary code.
1818
},
1919
'License' => MSF_LICENSE,

modules/exploits/windows/browser/yahoomessenger_fvcom.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize(info = {})
1313
'Name' => 'Yahoo! Messenger YVerInfo.dll ActiveX Control Buffer Overflow',
1414
'Description' => %q{
1515
This module exploits a stack buffer overflow in the Yahoo! Messenger ActiveX
16-
Control (YVerInfo.dll <= 2006.8.24.1). By sending a overly long string
16+
Control (YVerInfo.dll <= 2006.8.24.1). By sending an overly long string
1717
to the "fvCom()" method from a yahoo.com domain, an attacker may be able
1818
to execute arbitrary code.
1919
},

0 commit comments

Comments
 (0)