Skip to content

Commit 0109d81

Browse files
author
jvazquez-r7
committed
fix typo
1 parent c225d82 commit 0109d81

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/browser/java_cmm.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ def initialize( info = {} )
2727
and March of 2013. The vulnerability affects Java version 7u15 and earlier and 6u41
2828
and earlier and has been tested successfully on Windows XP SP3 and Windows 7 SP1
2929
systems. This exploit doesn't bypass click-to-play, so the user must accept the java
30-
warning in order tu run the malicious applet.
30+
warning in order to run the malicious applet.
3131
},
3232
'License' => MSF_LICENSE,
3333
'Author' =>

0 commit comments

Comments
 (0)