Skip to content

Commit a552132

Browse files
Update documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof.md
Co-authored-by: Christophe De La Fuente <[email protected]>
1 parent 65402ab commit a552132

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ An attacker can send a specially crafted message to the Wavelink Avalanche Manag
1111
which could result in arbitrary code execution with the `NT/AUTHORITY SYSTEM` permissions.
1212
This vulnerability occurs during the processing of 3/5/8/100/101/102 item data types.
1313
The program tries to copy the item data using `qmemcopy` to a fixed size data buffer on stack.
14-
Upon successfull exploitation the attacker gains full access to the target system.
14+
Upon successful exploitation the attacker gains full access to the target system.
1515

1616
The original analysis and the vulnerability discovery is done by the Tenable.
1717
Check [here](https://www.tenable.com/security/research/tra-2023-27) for public advisory.

0 commit comments

Comments
 (0)