Typo in module name
parent
a50ab1ddd3
commit
ac1388368f
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "MS13-069 Microsoft Internet Explorer CCaret Use-After-Free",
|
||||
'Name' => "MS13-069 Microsoft Internet Explorer Caret Use-After-Free",
|
||||
'Description' => %q{
|
||||
This module exploits a use-after-free vulnerability found in Internet Explorer,
|
||||
specifically in how the browser handles the caret (text cursor) object. In IE's standards
|
||||
|
@ -271,4 +271,4 @@ In mshtml!CCaret::UpdateScreenCaret function:
|
|||
.text:63620F89 push eax
|
||||
.text:63620F8A call dword ptr [ecx+2Ch]
|
||||
|
||||
=end
|
||||
=end
|
||||
|
|
Loading…
Reference in New Issue