Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Information for "MSET9 3DS"

From GameBrew

Basic information

Display titleMSET9 3DS
Default sort keyMSET9 3DS
Page length (in bytes)8,046
Page ID35938
Page content languageen-gb - British English
Page content modelwikitext
Indexing by robotsAllowed
Number of redirects to this page0
Page imageMset93ds.png

Page protection

EditAllow all users (infinite)
MoveAllow all users (infinite)
View the protection log for this page.

Edit history

Page creatorHydeWing (talk | contribs)
Date of page creation00:53, 17 October 2023
Latest editorHyatt (talk | contribs)
Date of latest edit07:02, 17 August 2024
Total number of edits4
Total number of distinct authors2
Recent number of edits (within past 90 days)0
Recent number of distinct authors0

Page properties

Hidden category (1)

This page is a member of a hidden category:

Transcluded templates (3)

Templates used on this page:

SEO properties

Description

Content

Page title: (title)
This attribute controls the content of the <title> element.
(Exploits) - GameBrew
Title mode (title_mode)
More_information
append
Article description: (description)
This attribute controls the content of the description and og:description elements.
MSET9 is a an exploit for the Nintendo 3DS that operates using the ARM9 architecture. It can be initiated by simply adding a specific filename to a SD card inserted into the console. This exploit takes advantage of a vulnerability present in the FSPXI:EnumerateExtSaveData function, which is invoked by MSET to parse 3DS extdata IDs for Data Management.
Article image: (image)
This attribute controls the content of the og:image element. This image is mostly displayed as a thumbnail on social media.
Mset93ds.png
Image alternative text: (image_alt)MSET9
Information from Extension:WikiSEO

Advertising: