We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 1b4f4fd commit 0aea4a8Copy full SHA for 0aea4a8
modules/exploits/windows/ftp/kmftp_utility_cwd.rb
@@ -15,9 +15,9 @@ def initialize(info = {})
15
super(update_info(info,
16
'Name' => 'Konica Minolta FTP Utility 1.00 Post Auth CWD Command SEH Overflow',
17
'Description' => %q{
18
- This module exploits a SEH overflow in Konica Minolta FTP Server 1.00.
+ This module exploits an SEH overflow in Konica Minolta FTP Server 1.00.
19
Konica Minolta FTP fails to check input size when parsing 'CWD' commands, which
20
- leads to a SEH overflow. Konica FTP allows anonymous access by default; valid
+ leads to an SEH overflow. Konica FTP allows anonymous access by default; valid
21
credentials are typically unnecessary to exploit this vulnerability.
22
},
23
'Author' =>
0 commit comments