diff --git a/modules/exploits/windows/browser/adobe_cooltype_sing.rb b/modules/exploits/windows/browser/adobe_cooltype_sing.rb index 73beb33af1..85c9047d2a 100644 --- a/modules/exploits/windows/browser/adobe_cooltype_sing.rb +++ b/modules/exploits/windows/browser/adobe_cooltype_sing.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow', 'Description' => %q{ This module exploits a vulnerability in the Smart INdependent Glyplets (SING) table - handling within versions 8.2.4 and 9.3.4 of Adobe Reader. Prior version are + handling within versions 8.2.4 and 9.3.4 of Adobe Reader. Prior versions are assumed to be vulnerable as well. }, 'License' => MSF_LICENSE, @@ -59,6 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote [ # Tested OK via Adobe Reader 9.3.4 on Windows XP SP3 -jjd # Tested OK via Adobe Reader 9.3.4 on Windows 7 -jjd + # Tested OK via Adobe Reader 9.3 on XP and 7 -todb [ 'Automatic', { }], ], 'DisclosureDate' => 'Sep 07 2010', diff --git a/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb b/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb index 9037d6dd7c..2d46f3f602 100644 --- a/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb +++ b/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb @@ -58,6 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote [ # Tested OK via Adobe Reader 9.3.4 on Windows XP SP3 -jjd # Tested OK via Adobe Reader 9.3.4 on Windows 7 -jjd + # Tested OK via Adobe Reader 9.3 on XP and 7 -todb [ 'Automatic', { }], ], 'DisclosureDate' => 'Sep 07 2010',