Showing 15,730 of 21,757 total issues
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'HTTP Interesting File Scanner',
'Description' => %q{
This module identifies the existence of interesting files
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'Barracuda Multiple Product "locale" Directory Traversal',
'Description' => %q{
This module exploits a directory traversal vulnerability present in
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'WordPress WPS Hide Login Login Page Revealer',
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Path Traversal in Oracle GlassFish Server Open Source Edition',
'Description' => %q{
This module exploits an unauthenticated directory traversal vulnerability
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'URGENT/11 Scanner, Based on Detection Tool by Armis',
'Description' => %q{
This module detects VxWorks and the IPnet IP stack, along with devices
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'ManageEngine DeviceExpert 5.6 ScheduleResultViewer FileName Traversal',
'Description' => %q{
This module exploits a directory traversal vulnerability found in ManageEngine
Method run_host
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
trav = "...\\...\\...\\...\\...\\...\\"
# In case the user doesn't realize he doesn't need to begin with "\",
# we'll correct that for him
Method check_app
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check_app(app)
res = send_request_cgi({
'uri' => app,
'method' => 'GET',
'ctype' => 'text/plain'
Method run
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
@base_stations = {}
print_status("Opening interface: #{datastore['INTERFACE']}")
print_status("Using band: #{datastore['BAND']}")
Method dump_hashes
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def dump_hashes(host, port)
# Grabs the username and password hashes and stores them as loot
res = mysql_query("SELECT user,password from mysql.user")
if res.nil?
Method get_server_hello
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def get_server_hello
server_done = nil
ssl_record_counter = 0
remaining_data = get_ssl_record
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'Cisco DLSw Information Disclosure Scanner',
'Description' => %q(
This module implements the DLSw information disclosure retrieval. There
Method check_host
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check_host(_ip)
# The check command will call this method instead of run_host
status = Exploit::CheckCode::Unknown
begin
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'Oracle iSQL*Plus Login Utility',
'Description' => %q{
This module attempts to authenticate against an Oracle ISQL*Plus
Method run_host
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
ssh_opts = ssh_client_defaults.merge({
:port => rport,
:auth_methods => ['password', 'keyboard-interactive'],
:password => %q{<<< %s(un='%s') = %u},
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell ZENworks Configuration Management Preboot Service Remote File Access',
'Description' => %q{
This module exploits a directory traversal in the ZENworks Configuration Management.
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Test SSH Github Access',
Method fingerprint_vmware
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def fingerprint_vmware(ip,res)
unless res
vprint_error("http://#{ip}:#{rport} - No response")
return false
end
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Kerberos Authentication Check Scanner',
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "VMWare Update Manager 4 Directory Traversal",
'Description' => %q{
This modules exploits a directory traversal vulnerability in VMWare Update Manager