We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 3396fb1 commit e21bf80Copy full SHA for e21bf80
modules/exploits/linux/http/f5_icall_cmd.rb
@@ -223,7 +223,7 @@ def exploit
223
print_status('Uploading payload...')
224
225
script_name = Rex::Text.rand_text_alpha_lower(5)
226
- create_script_res = create_script(script_name, cmd)
+ create_script_res = create_script(script_name, cmd)
227
unless create_script_res && create_script_res.code == 200
228
print_error("Upload script failed")
229
return false
0 commit comments