Fixed tab indents.

git-svn-id: file:///home/svn/framework3/trunk@5127 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Patrick Webster 2007-09-30 00:05:10 +00:00
parent ffc5c0a57d
commit e6a7184cf8
1 changed files with 26 additions and 27 deletions

View File

@ -23,11 +23,10 @@ class Exploits::Windows::Http::Xitami_If_Mod_Since < Msf::Exploit::Remote
'Name' => 'Xitami 2.5c2 Web Server If-Modified-Since Overflow', 'Name' => 'Xitami 2.5c2 Web Server If-Modified-Since Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack overflow in the iMatix Corporation This module exploits a stack overflow in the iMatix Corporation
Xitami xigui32.exe Web Server. If a malicious user sends an Xitami Web Server. If a malicious user sends an If-Modified-Since
If-Modified-Since header containing an overly long string, it may be header containing an overly long string, it may be possible to
possible to execute a payload remotely. Due to size constraints, execute a payload remotely. Due to size constraints, this module uses
this module uses the Egghunter technique. You may wish to adjust the Egghunter technique. You may wish to adjust WfsDelay appropriately.
WfsDelay appropriately.
}, },
'Author' => 'patrick', 'Author' => 'patrick',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,