1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

removed duplicate "uses" from description

This commit is contained in:
h00die 2015-03-29 19:40:31 -04:00
parent d3d920b810
commit 28b9e89963

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
request to the Office Document Conversions Launcher Service, which results in code
execution under the context of 'SYSTEM'.
The module uses uses the Windows Management Instrumentation service to execute an
The module uses the Windows Management Instrumentation service to execute an
arbitrary payload on vulnerable installations of SharePoint on Windows 2003 Servers.
It has been successfully tested on Office SharePoint Server 2007 SP2 over Windows
2003 SP2.