Update to fix bad naming scheme on new ie zero day

This commit is contained in:
trustedsec 2013-01-03 16:25:00 -05:00
parent 6475c5a89d
commit b87ae90b38
2 changed files with 2 additions and 1 deletions

View file

@ -7,6 +7,7 @@ version 4.3.4
* added an installer script for OSX in setup.py (thanks Wim Remes)
* fixed a bug in the menu system in powershell attack vectors. menu 99 wouldn't exit properly (thanks f8lerror)
* fixed a new bug that was introduced when README was moved from readme/README (thanks f8lerror)
* fixed a bug in the naming scheme for the new zero day ie
~~~~~~~~~~~~~~~~
version 4.3.3

View file

@ -36,7 +36,7 @@ def ms_module(exploit):
""" Receives the input given by the user from gen_payload.py """
return {
'1':"exploit/windows/browser/ie_cdwnbindinfo_uaf",
'1':"exploit/windows/browser/ie_cbutton_uaf",
'2':"exploit/multi/browser/java_jre17_exec",
'3':"exploit/windows/browser/ie_execcommand_uaf",
'4':"exploit/multi/browser/java_atomicreferencearray",