Not actually a typo
Turns out, the object name is "CCaret," though we're talking about the "caret." Confuz0ring!bug/bundler_fix sprint-C03
parent
ac1388368f
commit
d91cb85a31
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "MS13-069 Microsoft Internet Explorer Caret Use-After-Free",
|
||||
'Name' => "MS13-069 Microsoft Internet Explorer CCaret Use-After-Free",
|
||||
'Description' => %q{
|
||||
This module exploits a use-after-free vulnerability found in Internet Explorer,
|
||||
specifically in how the browser handles the caret (text cursor) object. In IE's standards
|
||||
|
|
Loading…
Reference in New Issue