Not actually a typo

Turns out, the object name is "CCaret," though we're talking about the
"caret." Confuz0ring!
bug/bundler_fix sprint-C03
Tod Beardsley 2013-09-24 15:55:52 -05:00
parent ac1388368f
commit d91cb85a31
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
1 changed files with 1 additions and 1 deletions

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={})
super(update_info(info,
'Name' => "MS13-069 Microsoft Internet Explorer Caret Use-After-Free",
'Name' => "MS13-069 Microsoft Internet Explorer CCaret Use-After-Free",
'Description' => %q{
This module exploits a use-after-free vulnerability found in Internet Explorer,
specifically in how the browser handles the caret (text cursor) object. In IE's standards