This commit is contained in:
jvazquez-r7
2013-07-08 16:55:39 -05:00
2 changed files with 3 additions and 3 deletions
@@ -11,8 +11,8 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'InstantCMS 1.6 Remote PHP Code Execution',
'Description' => %q{
This module exploits an arbitrary php command execution vulnerability, because of a
dangerous use of eval(), in InstantCMS versions 1.6.
This module exploits an arbitrary PHP command execution vulnerability because of a
dangerous use of eval() in InstantCMS in versions 1.6 and prior.
},
'Author' =>
[
@@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'ABBS Audio Media Player .LST Buffer Overflow',
'Description' => %q{
This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability
occurs when adding an .lst, allowing arbitrary code execution with the privileges
occurs when adding a specially crafted .lst file, allowing arbitrary code execution with the privileges
of the user running the application . This module has been tested successfully on
ABBS Audio Media Player 3.1 over Windows XP SP3 and Windows 7 SP1.
},