File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
modules/exploits/windows/fileformat Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -20,9 +20,9 @@ def initialize(info = {})
20
20
'Name' => 'Corel PDF Fusion Stack Buffer Overflow' ,
21
21
'Description' => %q{
22
22
This module exploits a stack-based buffer overflow vulnerability in version 1.11 of
23
- Corel PDF Fusion. The vulnerability exists while handling XPS files with long entry
23
+ Corel PDF Fusion. The vulnerability exists while handling a XPS file with long entry
24
24
names. In order for the payload to be executed, an attacker must convince the target
25
- user to open a specially crafted XPS file with Corel PDF Fusion. By doing so, an
25
+ user to open a specially crafted XPS file with Corel PDF Fusion. By doing so, the
26
26
attacker can execute arbitrary code as the target user.
27
27
} ,
28
28
'License' => MSF_LICENSE ,
You can’t perform that action at this time.
0 commit comments