From adba277be0290d98c3b7044a749726cb6ad56f2a Mon Sep 17 00:00:00 2001 From: William Webb Date: Mon, 4 Dec 2017 16:57:48 -0800 Subject: [PATCH] axe errant spaces at EOL --- modules/exploits/windows/fileformat/office_ms17_11882.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/fileformat/office_ms17_11882.rb b/modules/exploits/windows/fileformat/office_ms17_11882.rb index 9dc87de6a89d..ec5b951c8d6d 100644 --- a/modules/exploits/windows/fileformat/office_ms17_11882.rb +++ b/modules/exploits/windows/fileformat/office_ms17_11882.rb @@ -16,9 +16,9 @@ def initialize(info = {}) super(update_info(info, 'Name' => 'Microsoft Office CVE-2017-11882', 'Description' => %q{ - Module exploits a flaw in how the Equation Editor that - allows an attacker to execute arbitrary code in RTF files without - interaction. The vulnerability is caused by the Equation Editor, + Module exploits a flaw in how the Equation Editor that + allows an attacker to execute arbitrary code in RTF files without + interaction. The vulnerability is caused by the Equation Editor, to which fails to properly handle OLE objects in memory. }, 'Author' => ['mumbai', 'embedi'],