From e3d1f8e97bfdefd6da45d7898846fafbf1b70f09 Mon Sep 17 00:00:00 2001 From: Jay Turla Date: Fri, 19 Aug 2016 22:22:56 +0800 Subject: [PATCH] Updated the description --- modules/exploits/multi/http/phoenix_exec.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/exploits/multi/http/phoenix_exec.rb b/modules/exploits/multi/http/phoenix_exec.rb index 5b7c98f2f4..5487340051 100644 --- a/modules/exploits/multi/http/phoenix_exec.rb +++ b/modules/exploits/multi/http/phoenix_exec.rb @@ -14,10 +14,10 @@ class MetasploitModule < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Phoenix Exploit Kit Remote Code Execution', 'Description' => %q{ - This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit Remote Code Execution via the - geoip.php. The Phoenix Exploit Kit is a popular commercial crimeware tool that probes the browser of the visitor for - the presence of outdated and insecure versions of browser plugins like Java, and Adobe Flash and Reader which then - silently installs malware. + This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit via the geoip.php. The + Phoenix Exploit Kit is a popular commercial crimeware tool that probes the browser of the visitor for the + presence of outdated and insecure versions of browser plugins like Java, and Adobe Flash and Reader which + then silently installs malware. }, 'License' => MSF_LICENSE, 'Author' =>