Skip to content

Commit b3fbbbe

Browse files
committed
Spelling is hard
1 parent cc4f18e commit b3fbbbe

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
44
via its SMTP server validation. The module sends a malicious response along in the
5-
220 service ready response and exploits the client resulting in an unpriviledged shell.
5+
220 service ready response and exploits the client resulting in an unprivileged shell.
66

77
## Verification Steps
88

modules/exploits/windows/smtp/sysgauge_client_bof.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
##
1+
22
# This module requires Metasploit: http://metasploit.com/download
33
# Current source: https://github.com/rapid7/metasploit-framework
44
#
@@ -13,13 +13,15 @@
1313
class MetasploitModule < Msf::Exploit::Remote
1414
include Msf::Exploit::Remote::TcpServer
1515

16+
Rank = NormalRanking
17+
1618
def initialize()
1719
super(
1820
'Name' => 'SysGauge SMTP Validation Buffer Overflow',
1921
'Description' => %q{
2022
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
2123
via its SMTP server validation. The module sends a malicious response along in the
22-
220 service ready response and exploits the client resulting in an unpriviledged shell.
24+
220 service ready response and exploits the client resulting in an unprivileged shell.
2325
},
2426
'Author' =>
2527
[

0 commit comments

Comments
 (0)