modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb
Method on_request_uri
has 46 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
# Re-generate the payload.
return if ((p = regenerate_payload(cli)) == nil)
# Encode the shellcode.
Method initialize
has 32 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell iPrint Client ActiveX Control ExecuteRequest debug Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in Novell iPrint Client 5.40.