mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
Fix Javascript payload generation in msfweb: was passing the invalid
"javascript", so it now chooses "js_le" or "js_be" based on endianness git-svn-id: file:///home/svn/framework3/trunk@6042 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
9aa29aa876
commit
a30adcdca5
@ -124,7 +124,7 @@
|
||||
<option value="c">C</option>
|
||||
<option value="ruby">Ruby</option>
|
||||
<option value="perl">Perl</option>
|
||||
<option value="javascript">Javascript</option>
|
||||
<option value="js_<%= Rex::Arch.endian(@tmod.arch) == ENDIAN_BIG ? "b" : "l" %>e">Javascript</option>
|
||||
<option value="java">Java</option>
|
||||
<option value="raw">Raw</option>
|
||||
</select>
|
||||
|
Loading…
Reference in New Issue
Block a user