We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent d77efd5 commit 48a46f3Copy full SHA for 48a46f3
modules/exploits/windows/browser/ie_execcommand_uaf.rb
@@ -94,11 +94,11 @@ def get_target(agent)
94
end
95
96
def junk(n=4)
97
- return rand_text_alpha(n).unpack("L")[0].to_i
+ return rand_text_alpha(n).unpack("V")[0].to_i
98
99
100
def nop
101
- return make_nops(4).unpack("L")[0].to_i
+ return make_nops(4).unpack("V")[0].to_i
102
103
104
def get_payload(t, cli)
@@ -394,4 +394,4 @@ def exploit
394
020bc6dc 633a85c7 jscript!VAR::InvokeDispName+0x7a
395
020bc708 633a9c0b jscript!VAR::InvokeByDispID+0xce
396
020bc8a4 633a5ab0 jscript!CScriptRuntime::Run+0x2989
397
-=end
+=end
0 commit comments