From 23d0ffa3abbfcba7677e4358f6bd9d30b2b6ce68 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Sun, 9 Dec 2012 01:39:24 -0600 Subject: [PATCH] Dang it, grammar fail. --- modules/exploits/windows/mysql/mysql_mof.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/mysql/mysql_mof.rb b/modules/exploits/windows/mysql/mysql_mof.rb index 820797cc4a..cb9123ddee 100644 --- a/modules/exploits/windows/mysql/mysql_mof.rb +++ b/modules/exploits/windows/mysql/mysql_mof.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Oracle MySQL for Microsoft Windows MOF Execution', 'Description' => %q{ - This modules takes advantage of a file privilege misconfiguration problem + This module takes advantage of a file privilege misconfiguration problem specifically against Windows MySQL servers (due to the use of a .mof file). This may result in arbitrary code execution under the context of SYSTEM. However, please note in order to use this module, you must have a valid MySQL account on