1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00
git-svn-id: file:///home/svn/framework3/trunk@11380 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Joshua Drake 2010-12-20 09:11:45 +00:00
parent a3126ad8b5
commit b8b0e1af97

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Internet Explorer CSS SetUserClip Memory Corruption',
'Description' => %q{
Thie module exploits a memory corruption vulenrability within Microsoft's
Thie module exploits a memory corruption vulnerability within Microsoft's
HTML engine (mshtml). When parsing an HTML page containing a specially
crafted CSS tag, memory corruption occurs that can lead arbitrary code
execution.
@ -195,6 +195,7 @@ EOS
}
}
js = ::Rex::Exploitation::ObfuscateJS.new(js, opts)
#js.obfuscate()
# Construct the final page
html = <<-EOS