Fixed tab indents.
git-svn-id: file:///home/svn/framework3/trunk@5127 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
ffc5c0a57d
commit
e6a7184cf8
|
@ -23,11 +23,10 @@ class Exploits::Windows::Http::Xitami_If_Mod_Since < Msf::Exploit::Remote
|
||||||
'Name' => 'Xitami 2.5c2 Web Server If-Modified-Since Overflow',
|
'Name' => 'Xitami 2.5c2 Web Server If-Modified-Since Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a stack overflow in the iMatix Corporation
|
This module exploits a stack overflow in the iMatix Corporation
|
||||||
Xitami xigui32.exe Web Server. If a malicious user sends an
|
Xitami Web Server. If a malicious user sends an If-Modified-Since
|
||||||
If-Modified-Since header containing an overly long string, it may be
|
header containing an overly long string, it may be possible to
|
||||||
possible to execute a payload remotely. Due to size constraints,
|
execute a payload remotely. Due to size constraints, this module uses
|
||||||
this module uses the Egghunter technique. You may wish to adjust
|
the Egghunter technique. You may wish to adjust WfsDelay appropriately.
|
||||||
WfsDelay appropriately.
|
|
||||||
},
|
},
|
||||||
'Author' => 'patrick',
|
'Author' => 'patrick',
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
Loading…
Reference in New Issue