This commit is contained in:
6arelyFuture 2021-05-11 10:02:13 +02:00
parent b103d322b7
commit 5d55f10177
Signed by: Future
GPG Key ID: FA77F074E98D98A5

View File

@ -12,3 +12,16 @@ The exploit has since been mitigated, but the underlying bug in the client remai
## How does this work? ## How does this work?
The exploit works by modifying the server name with a malicious string of characters. It will make any client crash. The exploit works by modifying the server name with a malicious string of characters. It will make any client crash.
## Compile from source
- Clone the Git repo. Do NOT download it as ZIP, that won't work.
- Run `premake5 vs2019` or simply use the delivered `generate.bat`.
- Build via solution file in `build\server-list-exploit.sln`.
## Premake arguments
| Argument | Description |
|:----------------------------|:-----------------------------------------------|
| `--dev-build` | Do nothing. |
| `--copy-to` | Copy the EXE to a custom folder after build. |