Showing 7,361 of 22,177 total issues
Method run_host
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
users_found = {}
result = nil # temp for storing result of SMTP request
code = 0 # status code parsed from result
vrfy = true # if vrfy allowed
Method make_login
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def make_login(opts={})
pkt = ""
idx = 0
db = ""
Method generate
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def generate(opts={})
payload = %Q^
; Creating the socket file descriptor
; int socket(int domain, int type, int protocol);
; socket(AF_INET, SOCK_STREAM, IPPROTO_IP)
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Array Networks vAPV and vxAG Private Key Privilege Escalation Code Execution',
Method exploit
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
factory = ssh_socket_factory
opts = {
auth_methods: ['password', 'keyboard-interactive'],
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'ZoneMinder Snapshots Command Injection',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "HP System Management Homepage JustGetSNMPQueue Command Injection",
'Description' => %q{
This module exploits a vulnerability found in HP System Management Homepage. By
Method add_printer
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def add_printer(printer_name, cmd)
vprint_status("Adding new printer '#{printer_name}'")
ppd_name = "#{rand_text_alphanumeric(10 + rand(5))}.ppd"
ppd_file = <<-EOF
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Agent Tesla Panel Remote Code Execution',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Atlassian Confluence Widget Connector Macro Velocity Template Injection',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'DotCMS RCE via Arbitrary File Upload.',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Wordpress Popular Posts Authenticated RCE',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'SPIP form PHP Injection',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize( info = {} )
super( update_info( info,
'Name' => 'Java Applet Driver Manager Privileged toString() Remote Code Execution',
'Description' => %q{
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Google Chrome 67, 68 and 69 Object.create exploit',
Method exploit
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
print_status('Generating payload...')
case target.name
when 'Windows'
string0_cmd = 'cmd.exe'
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'LibreOffice Macro Code Execution',
'Description' => %q{
LibreOffice comes bundled with sample macros written in Python and
Method exploit
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
check_pcaprub_loaded # Check first
ret_offset = target['RetOff']
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Solaris xscreensaver log Privilege Escalation',
'Description' => %q{
This module exploits a vulnerability in `xscreensaver` versions
Method exploit
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
def infect(apkfile)
unless apkfile.start_with?("package:")
fail_with Failure::BadConfig, 'Unable to locate app apk'
end