Skip to content

Commit 37312f2

Browse files
author
Tod Beardsley
committed
Module, singular
1 parent 11e9cca commit 37312f2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info={})
1717
super(update_info(info,
1818
'Name' => "Honeywell HSC Remote Deployer ActiveX Remote Code Execution",
1919
'Description' => %q{
20-
This modules exploits a vulnerability found in the Honeywell HSC Remote Deployer
20+
This module exploits a vulnerability found in the Honeywell HSC Remote Deployer
2121
ActiveX. This control can be abused by using the LaunchInstaller() function to
2222
execute an arbitrary HTA from a remote location. This module has been tested
2323
successfully with the HSC Remote Deployer ActiveX installed with Honeywell EBI

0 commit comments

Comments
 (0)