We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 2aa5962 commit 769fa37Copy full SHA for 769fa37
modules/exploits/windows/browser/ntr_activex_check_bof.rb
@@ -32,7 +32,8 @@ def initialize(info = {})
32
'Description' => %q{
33
This module exploits a vulnerability found in NTR ActiveX 1.1.8. The
34
vulnerability exists in the Check() method, due to the insecure usage of strcat to
35
- build a URL using the bstrParams parameter contents, which leads to code execution
+ build a URL using the bstrParams parameter contents (note: this is also the reason
36
+ why the module won't allow you to modify the URIPATH), which leads to code execution
37
under the context of the user visiting a malicious web page. In order to bypass
38
DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.
39
},
0 commit comments