We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e35f603 commit c156ed6Copy full SHA for c156ed6
modules/exploits/windows/misc/achat_bof.rb
@@ -17,7 +17,7 @@ def initialize(info = {})
17
'Description' => %q{
18
This module exploits a Unicode SEH buffer overflow in Achat. By
19
sending a crafted message to the default port 9256/UDP, it's possible to overwrite the
20
- SEH handler. Even when the exploit is reliable, it depends of timing since there are
+ SEH handler. Even when the exploit is reliable, it depends on timing since there are
21
two threads overflowing the stack in the same time. This module has been tested on
22
Achat v0.150 running on Windows XP SP3 and Windows 7.
23
},
0 commit comments