Land #10172, Rm duplicate word in agitum_outpost_acs description
commit
3e8bd83c29
|
@ -18,7 +18,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
'Description' => %q{
|
||||
This module exploits a directory traversal vulnerability on Agnitum Outpost Internet
|
||||
Security 8.1. The vulnerability exists in the acs.exe component, allowing the user to load
|
||||
load arbitrary DLLs through the acsipc_server named pipe, and finally execute arbitrary
|
||||
arbitrary DLLs through the acsipc_server named pipe, and finally execute arbitrary
|
||||
code with SYSTEM privileges. This module has been tested successfully on Windows 7 SP1 with
|
||||
Agnitum Outpost Internet Security 8.1 (32 bits and 64 bits versions).
|
||||
},
|
||||
|
|
Loading…
Reference in New Issue