Merge branch 'master' of github.com:rapid7/metasploit-framework

This commit is contained in:
sinn3r 2012-03-07 14:51:39 -06:00
commit 7dfba9c00d
5 changed files with 10 additions and 10 deletions

View File

@ -17,9 +17,9 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => 'Apple Filing Protocol Info Enumerator',
'Description' => %q{
This module fetch AFP server information.
Including Server name, network address, supported AFP versions,
signature, machine type ,and server flags.
This module fetches AFP server information, including server name,
network address, supported AFP versions, signature, machine type,
and server flags.
},
'References' =>
[

View File

@ -18,8 +18,8 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => 'MongoDB Login Utility',
'Description' => %q{
This module scans for MongoDB server. By default MongoDB has no auth. If auth
is used, it is then possible to execute a brute force attack on the server.
This module attempts to brute force authentication credentials for MongoDB.
Note that, by default, MongoDB does not require authentication.
},
'References' =>
[

View File

@ -17,9 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => "ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow",
'Description' => %q{
This module exploits a vulnerability found in ASUS Net4Switch's ipswcom.dll
ActiveX control. A buffer overflow condition is possible in multiple places all
because of the poor use of the CxDbgPrint() function, which allows remote attackers
to gain arbitrary code execution under the context of the user.
ActiveX control. A buffer overflow condition is possible in multiple places due
to the use of the CxDbgPrint() function, which allows remote attackers to gain
arbitrary code execution under the context of the user.
},
'License' => MSF_LICENSE,
'Author' =>

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module exploits a vulnerability found in Sysax's SSH service. By
supplying a long username, the SSH server will copy that data on the stack
without any proper bounds checking, therefore allowing remote code execution
without proper bounds checking, therefore allowing remote code execution
under the context of the user. Please note that previous versions
(before 5.53) are also affected by this bug.
},