rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize( info = {} )

    super( update_info( info,
      'Name'          => 'Java Applet Reflection Type Confusion Remote Code Execution',
      'Description'   => %q{
Severity: Major
Found in modules/exploits/multi/browser/java_jre17_reflection_types.rb - About 2 hrs to fix

    Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(
          update_info(
            info,
            'Name' => 'Veritas Backup Exec Agent Remote Code Execution',
    Severity: Major
    Found in modules/exploits/multi/veritas/beagent_sha_auth_rce.rb - About 2 hrs to fix

      Method exploit has 58 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def exploit
      
          # 0x081fc968
      
          pattern = Rex::Text.pattern_create(12000)
      Severity: Major
      Found in modules/exploits/multi/samba/nttrans.rb - About 2 hrs to fix

        Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(
              update_info(
                info,
                'Name' => 'Apache ActiveMQ Unauthenticated Remote Code Execution',
        Severity: Major
        Found in modules/exploits/multi/misc/apache_activemq_rce_cve_2023_46604.rb - About 2 hrs to fix

          Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def initialize(info = {})
              super(
                update_info(
                  info,
                  'Name' => 'JBOSS EAP/AS Remoting Unified Invoker RCE',
          Severity: Major
          Found in modules/exploits/multi/misc/jboss_remoting_unified_invoker_rce.rb - About 2 hrs to fix

            Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info = {})
                super(
                  update_info(
                    info,
                    'Name' => 'GitLens Git Local Configuration Exec',
            Severity: Major
            Found in modules/exploits/multi/fileformat/gitlens_local_config_exec.rb - About 2 hrs to fix

              Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info={})
                  super(update_info(info,
                    'Name'           => "Squiggle 1.7 SVG Browser Java Code Execution",
                    'Description'    => %q{
                        This module abuses the SVG support to execute Java Code in the
              Severity: Major
              Found in modules/exploits/multi/misc/batik_svg_java.rb - About 2 hrs to fix

                Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info = {})
                    super(
                      update_info(
                        info,
                        'Name' => "QEMU Monitor HMP 'migrate' Command Execution",
                Severity: Major
                Found in modules/exploits/multi/misc/qemu_monitor_hmp_migrate_cmd_exec.rb - About 2 hrs to fix

                  Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def initialize(info = {})
                      super(
                        update_info(
                          info,
                          {
                  Severity: Major
                  Found in modules/exploits/windows/local/ms15_004_tswbproxy.rb - About 2 hrs to fix

                    Method exploit has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def exploit
                        check_session_arch
                    
                        begin
                          @token = get_imperstoken
                    Severity: Major
                    Found in modules/exploits/windows/local/ikeext_service.rb - About 2 hrs to fix

                      Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(
                            update_info(
                              info,
                              'Name' => 'Ricoh Driver Privilege Escalation',
                      Severity: Major
                      Found in modules/exploits/windows/local/ricoh_driver_privesc.rb - About 2 hrs to fix

                        Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize(info = {})
                            super(
                              update_info(
                                info,
                                'Name' => 'Windows Server 2012 SrClient DLL hijacking',
                        Severity: Major
                        Found in modules/exploits/windows/local/srclient_dll_hijacking.rb - About 2 hrs to fix

                          Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(
                                update_info(
                                  info,
                                  'Name' => 'Windows Update Orchestrator unchecked ScheduleWork call',
                          Severity: Major
                          Found in modules/exploits/windows/local/cve_2020_1313_system_orchestrator.rb - About 2 hrs to fix

                            Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize(info = {})
                                super(update_info(info,
                                  'Name'           => 'Sync Breeze Enterprise GET Buffer Overflow',
                                  'Description'    => %q{
                                    This module exploits a stack-based buffer overflow vulnerability
                            Severity: Major
                            Found in modules/exploits/windows/http/syncbreeze_bof.rb - About 2 hrs to fix

                              Method exploit has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def exploit
                                  # Generate the powershell payload
                                  command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, remove_comspec: true, wrap_double_quotes: true)
                                  step_name = datastore['STEPNAME'] || rand_text_alphanumeric(4 + rand(32 - 4))
                                  session = create_octopus_session unless datastore['APIKEY']
                              Severity: Major
                              Found in modules/exploits/windows/http/octopusdeploy_deploy.rb - About 2 hrs to fix

                                Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(
                                      update_info(
                                        info,
                                        'Name' => 'Sharepoint Dynamic Proxy Generator Unauth RCE',

                                  Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(
                                        update_info(
                                          info,
                                          'Name' => 'Kentico CMS Staging SyncServer Unserialize Remote Command Execution',
                                  Severity: Major
                                  Found in modules/exploits/windows/http/kentico_staging_syncserver.rb - About 2 hrs to fix

                                    Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize(info = {})
                                        super(
                                          update_info(
                                            info,
                                            'Name' => 'CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow',
                                    Severity: Major
                                    Found in modules/exploits/windows/nimsoft/nimcontroller_bof.rb - About 2 hrs to fix

                                      Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info={})
                                          super(update_info(info,
                                            'Name'           => "ERS Viewer 2011 ERS File Handling Buffer Overflow",
                                            'Description'    => %q{
                                                This module exploits a buffer overflow vulnerability found in ERS Viewer 2011
                                      Severity: Major
                                      Found in modules/exploits/windows/fileformat/erdas_er_viewer_bof.rb - About 2 hrs to fix

                                        Method initialize has 58 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(
                                              update_info(
                                                info,
                                                'Name' => 'Wifi Mouse RCE',
                                        Severity: Major
                                        Found in modules/exploits/windows/misc/wifi_mouse_rce.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language