We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent abd76c5 commit 23c2a07Copy full SHA for 23c2a07
modules/exploits/windows/browser/ms14_012_cmarkup_uaf.rb
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
12
13
def initialize(info={})
14
super(update_info(info,
15
- 'Name' => "MS14-012 Internet Explorer CMarkup Use-After-Free",
+ 'Name' => "MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free",
16
'Description' => %q{
17
This module exploits an use after free condition on Internet Explorer as used in the wild
18
on the "Operation SnowMan" in February 2014. The module uses Flash Player 12 in order to
0 commit comments