Browse Source

endpoints, not end points

Brent Cook 3 years ago
parent
commit
5309f2e4fb

+ 1
- 1
documentation/modules/exploit/unix/misc/psh_auth_bypass.md View File

@@ -1,6 +1,6 @@
1 1
 ## Vulnerable Application
2 2
 
3
-This module exploits the Polycom HDX Video End Points with software <= 3.0.5.
3
+This module exploits the Polycom HDX video endpoints with software <= 3.0.5.
4 4
 It was tested on a Polycom HDX 7000 running software version 3.0.3. Telnet port
5 5
 23 should be accessible, as it is with the factory default configuration.
6 6
 

+ 1
- 1
modules/exploits/unix/misc/psh_auth_bypass.rb View File

@@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
24 24
         'DisclosureDate'  => 'Jan 18 2013',
25 25
         'Description'     => %q(
26 26
           The login component of the Polycom Command Shell on Polycom HDX
27
-          Video End Points running software versions 3.0.5 and earlier
27
+          video endpints, running software versions 3.0.5 and earlier,
28 28
           is vulnerable to an authorization bypass when simultaneous
29 29
           connections are made to the service, allowing remote network
30 30
           attackers to gain access to a sandboxed telnet prompt without

Loading…
Cancel
Save