Skip to content

Commit c156ed6

Browse files
author
Tod Beardsley
committed
on, not of.
1 parent e35f603 commit c156ed6

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/misc/achat_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a Unicode SEH buffer overflow in Achat. By
1919
sending a crafted message to the default port 9256/UDP, it's possible to overwrite the
20-
SEH handler. Even when the exploit is reliable, it depends of timing since there are
20+
SEH handler. Even when the exploit is reliable, it depends on timing since there are
2121
two threads overflowing the stack in the same time. This module has been tested on
2222
Achat v0.150 running on Windows XP SP3 and Windows 7.
2323
},

0 commit comments

Comments
 (0)