Skip to content

Commit

Permalink
Land #2480, @todb-r7's changes for weekly update
Browse files Browse the repository at this point in the history
  • Loading branch information
jvazquez-r7 committed Oct 7, 2013
2 parents 5aa3709 + 219bef4 commit 0991b72
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion modules/auxiliary/gather/coldfusion_pwd_props.rb
Expand Up @@ -168,7 +168,7 @@ def run
out, filename = fingerprint(res)
print_status("#{peer} #{out}") if out

if(out =~ /Not Vulnerable/)
if(out =~ /Not Vulnerable/)
print_status("#{peer} isn't vulnerable to this attack")
return
end
Expand Down
Expand Up @@ -26,9 +26,9 @@ class Metasploit3 < Msf::Exploit::Remote

def initialize(info={})
super(update_info(info,
'Name' => "SIEMENS Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution",
'Name' => "Siemens Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution",
'Description' => %q{
This module exploits the SEListCtrlX ActiveX installed with the SIEMENS Solid Edge product.
This module exploits the SEListCtrlX ActiveX installed with the Siemens Solid Edge product.
The vulnerability exists on several APIs provided by the control, where user supplied input
is handled as a memory pointer without proper validation, allowing an attacker to read and
corrupt memory from the target process. This module abuses the methods NumChildren() and
Expand Down Expand Up @@ -497,4 +497,4 @@ def on_request_uri(cli, request)
send_response(cli, html, {'Content-Type'=>'text/html'})
end

end
end

0 comments on commit 0991b72

Please sign in to comment.