Microsoft Windows Contact File Format Arbitary Code Execution
Posted by deepcore on April 12, 2019 – 1:30 am
This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact files.
Post a reply
You must be logged in to post a comment.