Skip to content

Commit b315a4e

Browse files
committed
Grammar
1 parent e3a126a commit b315a4e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/windows/misc/hp_dataprotector_dtbclslogin.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ def initialize(info = {})
1919
'Description' => %q{
2020
This module exploits a stack buffer overflow in HP Data Protector 4.0 SP1. The
2121
overflow occurs during the login process, in the DtbClsLogin function provided by
22-
the dpwindtb.dll component, where the Utf8Cpy (strcpy like function) is used in a
23-
insecure way with the username. Successful exploitation will lead to code execution
22+
the dpwindtb.dll component, where the Utf8Cpy (strcpy like function) is used in an
23+
insecure way with the username. A successful exploitation will lead to code execution
2424
with the privileges of the "dpwinsdr.exe" (HP Data Protector Express Domain Server
2525
Service) process, which runs as SYSTEM by default.
2626
},
@@ -114,7 +114,7 @@ def exploit
114114
hello_response = sock.get
115115

116116
if not hello_response or hello_response.empty?
117-
print_error("#{sock.peerinfo} - The Hello Request haven't had response")
117+
print_error("#{sock.peerinfo} - The Hello Request hasn't received a response")
118118
return
119119
end
120120

0 commit comments

Comments
 (0)