Skip to content

Commit a2743e4

Browse files
committed
Land rapid7#2692, fix title for ms13_022
2 parents f1c5ab9 + 253719d commit a2743e4

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/browser/ms13_022_silverlight_script_object.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
2020

2121
def initialize(info={})
2222
super(update_info(info,
23-
'Name' => "MS12-022 Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access",
23+
'Name' => "MS12-022 Microsoft Silverlight ScriptObject Unsafe Memory Access",
2424
'Description' => %q{
2525
This module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on
2626
the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an

0 commit comments

Comments
 (0)