Typo in module name

bug/bundler_fix
Tod Beardsley 2013-09-24 15:50:50 -05:00
parent a50ab1ddd3
commit ac1388368f
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
1 changed files with 2 additions and 2 deletions

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={})
super(update_info(info,
'Name' => "MS13-069 Microsoft Internet Explorer CCaret Use-After-Free",
'Name' => "MS13-069 Microsoft Internet Explorer Caret Use-After-Free",
'Description' => %q{
This module exploits a use-after-free vulnerability found in Internet Explorer,
specifically in how the browser handles the caret (text cursor) object. In IE's standards
@ -271,4 +271,4 @@ In mshtml!CCaret::UpdateScreenCaret function:
.text:63620F89 push eax
.text:63620F8A call dword ptr [ecx+2Ch]
=end
=end