fixed typo

git-svn-id: file:///home/svn/framework3/trunk@7486 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2009-11-13 00:21:09 +00:00
parent 8a691a20ff
commit 2e4f5734ea
1 changed files with 2 additions and 2 deletions

View File

@ -18,9 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'HP LoadRunner 9.0 ActiveX Buffer Overflow',
'Name' => 'HP LoadRunner 9.0 ActiveX AddFolder Buffer Overflow',
'Description' => %q{
This module exploits a stack overflow in Persists Software Inc's
This module exploits a stack overflow in Persits Software Inc's
XUpload ActiveX control(version 2.1.0.1) thats included in HP LoadRunner 9.0.
By passing an overly long string to the AddFolder method, an attacker may be
able to execute arbitrary code.