Skip to content

Commit f622a3a

Browse files
committed
Fix typo
1 parent 1133332 commit f622a3a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/http/ericom_access_now_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
'Name' => 'Ericom AccessNow Server Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack based buffer overflow in Ericom AccessNow Server. The
18-
vulnerability is due to an insecure usage of vsprintf with used controlled data,
18+
vulnerability is due to an insecure usage of vsprintf with user controlled data,
1919
which can be triggered with a malformed HTTP request. This module has been tested
2020
successfully with Ericom AccessNow Server 2.4.0.2 on Windows XP SP3 and Windows 2003
2121
Server SP2.

0 commit comments

Comments
 (0)