Skip to content

Commit 8a0a592

Browse files
committed
more adjustments
1 parent 024a2f5 commit 8a0a592

File tree

6 files changed

+16
-75
lines changed

6 files changed

+16
-75
lines changed

documentation/modules/exploit/linux/http/unraid_auth_bypass_exec.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@ according to the [UnRAID Getting Started](https://wiki.unraid.net/UnRAID_6/Getti
2525

2626
## Options
2727

28-
### TARGETURI : The URI of the Unraid application
28+
### TARGETURI
29+
30+
The URI of the Unraid application
2931

3032
## Scenarios
3133

documentation/modules/exploit/multi/misc/osgi_console_exec.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,9 @@ You can verify the module against the vulnerable application with those steps:
8383

8484
## Options
8585

86-
### TIME_WAIT - Time to wait for payload to be executed. The default value is set to 20 seconds.
86+
### TIME_WAIT
87+
88+
Time to wait for payload to be executed. The default value is set to 20 seconds.
8789

8890
## Scenarios
8991

documentation/modules/exploit/multi/persistence/joplin_plugin.md

Whitespace-only changes.

documentation/modules/exploit/osx/persistence/launch_plist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,4 +111,4 @@ Process 2138 created.
111111
Channel 8 created.
112112
launchctl load -w /Users/macos/Library/LaunchAgents/com.system.update.plist
113113
[*] Meterpreter session 5 opened (111.111.1.111:4444 -> 222.22.2.2:49157) at 2025-02-19 19:11:23 -0500
114-
```
114+
```

documentation/modules/exploit/unix/ftp/vsftpd_234_backdoor.md

Lines changed: 0 additions & 69 deletions
This file was deleted.

documentation/modules/exploit/windows/http/moveit_cve_2023_34362.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,17 @@ https://www.ipswitch.com/forms/free-trials/moveit-transfer
2424
4. After the installation completes, follow the instructions to create an admin user.
2525

2626
## Options
27-
### LOGIN_NAME (Required) Will be used as the login name for the system administrator created by the exploit. The default is random.
27+
### LOGIN_NAME
2828

29-
### PASSWORD (Required) Will be used as the password name for the system administrator created by the exploit. The default is random.
29+
(Required) Will be used as the login name for the system administrator created by the exploit. The default is random.
3030

31-
### USERNAME (Required) Will be used as the user name for the system administrator created by the exploit. The default is random.
31+
### PASSWORD
32+
33+
(Required) Will be used as the password name for the system administrator created by the exploit. The default is random.
34+
35+
### USERNAME
36+
37+
(Required) Will be used as the user name for the system administrator created by the exploit. The default is random.
3238

3339
## Verification Steps
3440
* Do: `msfconsole`

0 commit comments

Comments
 (0)