Skip to content

Commit 2b65cfa

Browse files
committed
Minor changes
1 parent 1623877 commit 2b65cfa

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/exploits/windows/browser/ms13_009_ie_slayoutrun_uaf.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,18 +15,18 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info={})
1717
super(update_info(info,
18-
'Name' => "Microsoft Internet Explorer SLayoutRun Use-After-Free",
19-
'Description' => %q{
18+
'Name' => "MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free",
19+
'Description' => %q{
2020
This module exploits a use-after-free vulnerability in Microsoft Internet Explorer
2121
where a CParaElement node is released but a reference is still kept
2222
in CDoc. This memory is reused when a CDoc relayout is performed.
2323
},
24-
'License' => MSF_LICENSE,
25-
'Author' =>
24+
'License' => MSF_LICENSE,
25+
'Author' =>
2626
[
2727
'Scott Bell <[email protected]>' # Vulnerability discovery & Metasploit module
2828
],
29-
'References' =>
29+
'References' =>
3030
[
3131
[ 'CVE', '2013-0025' ],
3232
[ 'MSB', 'MS13-009' ],

0 commit comments

Comments
 (0)