We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 1133332 commit f622a3aCopy full SHA for f622a3a
modules/exploits/windows/http/ericom_access_now_bof.rb
@@ -15,7 +15,7 @@ def initialize(info = {})
15
'Name' => 'Ericom AccessNow Server Buffer Overflow',
16
'Description' => %q{
17
This module exploits a stack based buffer overflow in Ericom AccessNow Server. The
18
- vulnerability is due to an insecure usage of vsprintf with used controlled data,
+ vulnerability is due to an insecure usage of vsprintf with user controlled data,
19
which can be triggered with a malformed HTTP request. This module has been tested
20
successfully with Ericom AccessNow Server 2.4.0.2 on Windows XP SP3 and Windows 2003
21
Server SP2.
0 commit comments