modules/exploits/windows/browser/ms09_072_style_object.rb
Method initialize
has 43 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'MS09-072 Microsoft Internet Explorer Style getElementsByTagName Memory Corruption',
'Description' => %q{
This module exploits a vulnerability in the getElementsByTagName function
Method on_request_uri
has 34 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
# resulting eips:
# 0x501d6bd8 # windows vista ie7 (mshtml.dll 7.0.6001.18203)
# 0xc5fe7dc9 # windows xp sp3 ie6 (mshtml.dll 6.0.2900.5848)