File tree Expand file tree Collapse file tree 1 file changed +5
-5
lines changed
modules/exploits/windows/browser Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -15,18 +15,18 @@ class Metasploit3 < Msf::Exploit::Remote
15
15
16
16
def initialize ( info = { } )
17
17
super ( update_info ( info ,
18
- 'Name' => "Microsoft Internet Explorer SLayoutRun Use-After-Free" ,
19
- 'Description' => %q{
18
+ 'Name' => "MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free" ,
19
+ 'Description' => %q{
20
20
This module exploits a use-after-free vulnerability in Microsoft Internet Explorer
21
21
where a CParaElement node is released but a reference is still kept
22
22
in CDoc. This memory is reused when a CDoc relayout is performed.
23
23
} ,
24
- 'License' => MSF_LICENSE ,
25
- 'Author' =>
24
+ 'License' => MSF_LICENSE ,
25
+ 'Author' =>
26
26
[
27
27
'Scott Bell <[email protected] >' # Vulnerability discovery & Metasploit module
28
28
] ,
29
- 'References' =>
29
+ 'References' =>
30
30
[
31
31
[ 'CVE' , '2013-0025' ] ,
32
32
[ 'MSB' , 'MS13-009' ] ,
You can’t perform that action at this time.
0 commit comments