Merge branch 'master' of github.com:rapid7/metasploit-framework
commit
0550b77522
|
@ -14,13 +14,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "Adobe Flash Player MP4 cprt Overflow",
|
||||
'Name' => "Adobe Flash Player .mp4 'cprt' Overflow",
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability found in Adobe Flash Player.
|
||||
This module exploits a vulnerability found in Adobe Flash Player.
|
||||
By supplying a corrupt .mp4 file loaded by Flash, it is possible to gain arbitrary
|
||||
remote code exeuction under the context of the user. Please note that this
|
||||
vulnerability has also been exploited in the wild, with "Iranian nuclear program"
|
||||
used as a phishing attack vector.
|
||||
remote code exeuction under the context of the user.
|
||||
|
||||
This vulnerability has been exploited in the wild as part of the
|
||||
"Iran's Oil and Nuclear Situation.doc" phishing campaign.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue