modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb
Method initialize
has 37 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Works 7 WkImgSrv.dll WKsPictureInterface() ActiveX Code Execution',
'Description' => %q{
The Microsoft Works ActiveX control (WkImgSrv.dll) could allow a remote attacker
Method exploit
has 32 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# Encode the shellcode.
shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))