Skip to content

Commit b646e0e

Browse files
committed
docs editing for consistency
1 parent fb02ec4 commit b646e0e

File tree

2 files changed

+6
-1
lines changed

2 files changed

+6
-1
lines changed

documentation/modules/exploit/linux/http/craftcms_preauth_rce_cve_2025_32432.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,9 @@ ddev launch
7575

7676
The module has the following option:
7777

78-
- **ASSET_ID**: This option is required for older versions of Craft CMS, particularly in the 3.x series.
78+
### ASSET_ID
79+
80+
This option is required for older versions of Craft CMS, particularly in the 3.x series.
7981
It specifies the asset ID for the Craft CMS instance. For 3.x versions, this ID must be set correctly to exploit the vulnerability.
8082

8183
For example, if you are targeting a Craft CMS version from the `>= 3.0.0`, `< 3.9.14`, make sure to specify the correct `ASSET_ID`.

documentation/modules/exploit/linux/local/cve_2021_3493_overlayfs.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,13 @@ compilation on target, False will upload a precompiled binary. AUTO will favor
3535
but will fall back to the precompiled option if a compiler cannot be found.
3636

3737
### WritableDir
38+
3839
This indicates the location where you would like the payload and exploit binary stored, as well
3940
as serving as a location to store the various files and directories created by the exploit itself.
4041
The default value is `/tmp`
4142

43+
## Scenarios
44+
4245
### Ubuntu 20.04.0 x64
4346

4447
```

0 commit comments

Comments
 (0)