From 81813a78fcfd39224516e4f98b7d30bea084224c Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Thu, 13 Jun 2013 11:55:23 -0500 Subject: [PATCH] Fix module Name --- modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb b/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb index 3448643eb0..10f06bc4ea 100644 --- a/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb +++ b/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb @@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info={}) super(update_info(info, - 'Name' => "MS13-009 Microsoft Internet Explorer COALineDashStyleArray Integer Overflow", + 'Name' => "MS13-037 Microsoft Internet Explorer COALineDashStyleArray Integer Overflow", 'Description' => %q{ This module exploits an integer overflow vulnerability on Internet Explorer. The vulnerability exists in the handling of the dashstyle.array length for vml @@ -443,4 +443,4 @@ function exploit(){ end -end \ No newline at end of file +end