modules/exploits/windows/fileformat/microsoft_windows_contact.rb
Method exploit
has 44 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
contact_full_name = "#{datastore['FILENAME']}"
exe_filename = "#{datastore['WEBSITE']}"
xml_header = %Q|<?xml version="1.0" encoding="UTF-8"?>
Method initialize
has 39 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Windows Contact File Format Arbitary Code Execution',
'Description' => %q{
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows.