rastating/wordpress-exploit-framework

View on GitHub
lib/wpxf/modules/auxiliary/misc/email_users_csrf_bulk_mail.rb

Summary

Maintainability
A
1 hr
Test Coverage

Method initialize has 34 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize
    super

    update_info(
      name: 'Email Users <= 4.8.3 CSRF Bulk Mail',
Severity: Minor
Found in lib/wpxf/modules/auxiliary/misc/email_users_csrf_bulk_mail.rb - About 1 hr to fix

    There are no issues that match your filters.

    Category
    Status