modules/exploits/windows/fileformat/ms13_071_theme.rb
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "MS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution",
'Description' => %q{
This module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows
Method primer
has 32 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def primer
self.file_contents = generate_payload_exe
print_status("Malicious SCR available on #{unc}...")
# Default Windows XP / 2003 theme modified