Showing 4,139 of 21,886 total issues
File firefox_creds.rb
has 580 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'tmpdir'
#
# Gems
#
Method command_string
has 247 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def command_string
if (datastore['JOBNAME'] == "DUMMY") && !datastore['FTPUSER'].nil?
datastore['JOBNAME'] = (datastore['FTPUSER'] + "1").strip.upcase
end
lhost = Rex::Socket.resolv_nbo(datastore['LHOST'])
Method osx_capture_media
has 247 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def osx_capture_media(opts)
capture_code = <<-EOS
#{osx_ruby_dl_header}
options = {
Method mssql_login
has 246 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def mssql_login(user='sa', pass='', db='', domain_name='')
prelogin_data = mssql_prelogin
if auth == Msf::Exploit::Remote::AuthOption::KERBEROS
idx = 0
pkt = ''
Method get_registry
has 245 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def get_registry(outlook_ver)
# Determine if saved accounts exist within Outlook. Ignore the Address Book and Personal Folder registry entries.
outlook_exists = 0
saved_accounts = 0
File protocol.rb
has 575 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require "socket"
require "timeout"
require "digest/sha1"
require "stringio"
Method run
has 241 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
vprint_status("#{peer} - Checking ")
# since we will check res to see if auth was a success, make sure to capture the return
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path),
Method run_host
has 240 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
# Force http verb to be upper-case, because otherwise some web servers such as
# Apache might throw you a 501
http_method = datastore['METHOD'].upcase
File message.rb
has 566 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'postgres_msf'
require 'postgres/buffer'
require 'rex/io/stream'
# Monkeypatch to preserve original code intent
File userspec_generic.py
has 564 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
#!/usr/bin/python
'''
Exploit for CVE-2021-3156 with struct userspec overwrite by sleepya
From https://github.com/worawit/CVE-2021-3156
Method initialize
has 238 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Cisco RV110W/RV130(W)/RV215W Routers Management Interface Remote Command Execution',
File client_core.rb
has 562 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'rex/post/meterpreter/packet'
require 'rex/post/meterpreter/core_ids'
require 'rex/post/meterpreter/extension'
require 'rex/post/meterpreter/extension_mapper'
require 'rex/post/meterpreter/client'
Method run
has 237 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
if ! @telephony_loaded
print_error("The Telephony module is not available: #{@telephony_error}")
raise RuntimeError, "Telephony not available"
end
File Program.cs
has 559 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
using System;
using System.IO;
using System.Runtime.InteropServices;
using System.Text;
File weblogic_deserialize_unicastref.rb
has 558 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::TcpServer
Method exploit
has 234 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
main = %q^
/*
* Exploit Title: pkexec Race condition (CVE-2011-1485) exploit
* Author: xi4oyu
Class Core
has 64 methods (exceeds 20 allowed). Consider refactoring. Open
Open
class Console::CommandDispatcher::Core
include Console::CommandDispatcher
#
File nexpose.rb
has 553 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'English'
require 'nexpose'
module Msf
Nexpose_yaml = "#{Msf::Config.config_directory}/nexpose.yaml".freeze # location of the nexpose.yml containing saved nexpose creds
File nexpose_raw_document.rb
has 553 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require "rex/parser/nokogiri_doc_mixin"
require "date"
module Rex
module Parser
File weblogic_deserialize_badattr_extcomp.rb
has 551 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::CmdStager