mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
typo in description
git-svn-id: file:///home/svn/framework3/trunk@7702 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
9b2d5fcd24
commit
d93be3e873
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'Name' => 'Microsoft RPC DCOM Interface Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack overflow in the RPCSS service, this vulnerability
|
||||
was originally found by the Last Stage of Delirium research group and has bee
|
||||
was originally found by the Last Stage of Delirium research group and has been
|
||||
widely exploited ever since. This module can exploit the English versions of
|
||||
Windows NT 4.0 SP3-6a, Windows 2000, Windows XP, and Windows 2003 all in one request :)
|
||||
},
|
||||
|
Loading…
Reference in New Issue
Block a user