From 4fbab43f27e4243597a42b182a1b37e7a6b07672 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Wed, 1 Oct 2014 14:26:09 -0500 Subject: [PATCH] Release fixes, all titles and descs --- modules/auxiliary/admin/http/wp_custom_contact_forms.rb | 4 ++-- modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb | 2 +- modules/exploits/multi/http/opmanager_socialit_file_upload.rb | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb index 4665bb047b..6052c38d5f 100644 --- a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb +++ b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb @@ -13,10 +13,10 @@ class Metasploit3 < Msf::Auxiliary 'Description' => %q{ The WordPress custom-contact-forms plugin <= 5.1.0.3 allows unauthenticated users to download a SQL dump of the plugins database tables. It's also possible to upload files containing - sql statements which will be executed. The module first tries to extract the WordPress + SQL statements which will be executed. The module first tries to extract the WordPress table prefix from the dump and then attempts to create a new admin user. }, - 'Author' => + 'Author' => [ 'Marc-Alexandre Montpas', # Vulnerability discovery 'Christian Mehlmauer' # Metasploit module diff --git a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb index 119e0df18d..6c46acee52 100644 --- a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb +++ b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote vulnerability exists in the pmd service, due to the insecure usage of functions like strcpy and strcat while handling stack_option packets with user controlled data. In order to bypass ASLR this module uses a proto_tbl packet to leak an libov pointer from - the stack and finally build the rop chain to avoid NX. + the stack and finally build the ROP chain to avoid NX. }, 'Author' => [ diff --git a/modules/exploits/multi/http/opmanager_socialit_file_upload.rb b/modules/exploits/multi/http/opmanager_socialit_file_upload.rb index b8501c60ea..9218d8266e 100644 --- a/modules/exploits/multi/http/opmanager_socialit_file_upload.rb +++ b/modules/exploits/multi/http/opmanager_socialit_file_upload.rb @@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'ManageEngine OpManager / Social IT Arbitrary File Upload', + 'Name' => 'ManageEngine OpManager and Social IT Arbitrary File Upload', 'Description' => %q{ This module exploits a file upload vulnerability in ManageEngine OpManager and Social IT. The vulnerability exists in the FileCollector servlet which accepts unauthenticated