Skip to content

Commit

Permalink
Land #10172, Rm duplicate word in agitum_outpost_acs description
Browse files Browse the repository at this point in the history
  • Loading branch information
wchen-r7 committed Jun 15, 2018
2 parents ad97809 + b64ab9b commit 3e8bd83
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion modules/exploits/windows/local/agnitum_outpost_acs.rb
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ def initialize(info={})
'Description' => %q{
This module exploits a directory traversal vulnerability on Agnitum Outpost Internet
Security 8.1. The vulnerability exists in the acs.exe component, allowing the user to load
load arbitrary DLLs through the acsipc_server named pipe, and finally execute arbitrary
arbitrary DLLs through the acsipc_server named pipe, and finally execute arbitrary
code with SYSTEM privileges. This module has been tested successfully on Windows 7 SP1 with
Agnitum Outpost Internet Security 8.1 (32 bits and 64 bits versions).
},
Expand Down

0 comments on commit 3e8bd83

Please sign in to comment.