From cde3c487651471fd04e54ec910057f1cc9e7965b Mon Sep 17 00:00:00 2001 From: sinn3r Date: Thu, 14 Jun 2012 14:18:30 -0500 Subject: [PATCH] Change title --- modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb b/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb index f85431683d..3dbd5635f9 100644 --- a/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb +++ b/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'ComSndFTP v1.3.7 Beta USER Format String Overflow', + 'Name' => 'ComSndFTP v1.3.7 Beta USER Buffer Overflow', 'Description' => %q{ This module exploits the ComSndFTP FTP Server version 1.3.7 beta by sending a specially crafted format string specifier as a username. The crafted username is sent to to the server to