X-Git-Url: https://wimlib.net/git/?p=wimlib;a=blobdiff_plain;f=doc%2Fman1%2Fimagex-apply.1.in;fp=doc%2Fman1%2Fimagex-apply.1.in;h=8d3f72a867786c64f264e0787a2ff8f64c4f7aa0;hp=93a82e0dae8f9c16e6de264ca8e740f066295ac9;hb=318a6c9d7bb1c6f6f94f6dc39ee9a54eb0280493;hpb=292930754e68fa2ecee1be688efc2a90aa092112 diff --git a/doc/man1/imagex-apply.1.in b/doc/man1/imagex-apply.1.in index 93a82e0d..8d3f72a8 100644 --- a/doc/man1/imagex-apply.1.in +++ b/doc/man1/imagex-apply.1.in @@ -441,7 +441,7 @@ wimlib cannot extract such files until they are first decrypted. .PP \fIDirectory traversal attacks\fR: wimlib validates filenames before extracting them and is not vulnerable to directory traversal attacks. This is in contrast -to Microsoft WIMGAPI/Imagex/Dism which can overwrite arbitrary files on the +to Microsoft WIMGAPI/ImageX/DISM which can overwrite arbitrary files on the target drive when extracting a malicious WIM file containing files named \fI..\fR or containing path separators. .SH EXAMPLES