mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
fix typo
git-svn-id: file:///home/svn/framework3/trunk@11380 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
a3126ad8b5
commit
b8b0e1af97
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
super(update_info(info,
|
||||
'Name' => 'Internet Explorer CSS SetUserClip Memory Corruption',
|
||||
'Description' => %q{
|
||||
Thie module exploits a memory corruption vulenrability within Microsoft's
|
||||
Thie module exploits a memory corruption vulnerability within Microsoft's
|
||||
HTML engine (mshtml). When parsing an HTML page containing a specially
|
||||
crafted CSS tag, memory corruption occurs that can lead arbitrary code
|
||||
execution.
|
||||
@ -195,6 +195,7 @@ EOS
|
||||
}
|
||||
}
|
||||
js = ::Rex::Exploitation::ObfuscateJS.new(js, opts)
|
||||
#js.obfuscate()
|
||||
|
||||
# Construct the final page
|
||||
html = <<-EOS
|
||||
|
Loading…
Reference in New Issue
Block a user