Cosmetic module and service name fixes
git-svn-id: file:///home/svn/framework3/trunk@13917 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
d0ab01d332
commit
0ff7f17cba
|
@ -4133,6 +4133,7 @@ class DBManager
|
|||
when "http-proxy"; "http"
|
||||
when "iiimsf"; "db2"
|
||||
when "oracle-tns"; "oracle"
|
||||
when "quickbooksrds"; "metasploit"
|
||||
when /^dns-(udp|tcp)$/; "dns"
|
||||
when /^dce[\s+]rpc$/; "dcerpc"
|
||||
else
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Apache Range header DoS(Apache Killer)',
|
||||
'Name' => 'Apache Range header DoS (Apache Killer)',
|
||||
'Description' => %q{
|
||||
The byterange filter in the Apache HTTP Server 2.0.x through 2.0.64, and 2.2.x
|
||||
through 2.2.19 allows remote attackers to cause a denial of service (memory and
|
||||
|
@ -78,4 +78,4 @@ class Metasploit3 < Msf::Auxiliary
|
|||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'myBB 1.6.4 Backdoor Exploit',
|
||||
'Name' => 'myBB 1.6.4 Backdoor Arbitrary Command Execution',
|
||||
'Description' => %q{
|
||||
myBB is a popular open source PHP forum software. Version 1.6.4 contained an
|
||||
unauthorized backdoor, distributed as part of the vendor's source package.
|
||||
|
|
Loading…
Reference in New Issue