diff --git a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb index 4665bb047b..6052c38d5f 100644 --- a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb +++ b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb @@ -13,10 +13,10 @@ class Metasploit3 < Msf::Auxiliary 'Description' => %q{ The WordPress custom-contact-forms plugin <= 5.1.0.3 allows unauthenticated users to download a SQL dump of the plugins database tables. It's also possible to upload files containing - sql statements which will be executed. The module first tries to extract the WordPress + SQL statements which will be executed. The module first tries to extract the WordPress table prefix from the dump and then attempts to create a new admin user. }, - 'Author' => + 'Author' => [ 'Marc-Alexandre Montpas', # Vulnerability discovery 'Christian Mehlmauer' # Metasploit module diff --git a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb index 119e0df18d..6c46acee52 100644 --- a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb +++ b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote vulnerability exists in the pmd service, due to the insecure usage of functions like strcpy and strcat while handling stack_option packets with user controlled data. In order to bypass ASLR this module uses a proto_tbl packet to leak an libov pointer from - the stack and finally build the rop chain to avoid NX. + the stack and finally build the ROP chain to avoid NX. }, 'Author' => [ diff --git a/modules/exploits/multi/http/opmanager_socialit_file_upload.rb b/modules/exploits/multi/http/opmanager_socialit_file_upload.rb index b8501c60ea..9218d8266e 100644 --- a/modules/exploits/multi/http/opmanager_socialit_file_upload.rb +++ b/modules/exploits/multi/http/opmanager_socialit_file_upload.rb @@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'ManageEngine OpManager / Social IT Arbitrary File Upload', + 'Name' => 'ManageEngine OpManager and Social IT Arbitrary File Upload', 'Description' => %q{ This module exploits a file upload vulnerability in ManageEngine OpManager and Social IT. The vulnerability exists in the FileCollector servlet which accepts unauthenticated