Showing 7,361 of 22,177 total issues
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'HashiCorp Nomad Remote Command Execution',
Method exploit
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if !datastore['ForceExploit'] && is_root?
fail_with(Failure::BadConfig, 'Session already has root privileges. Set ForceExploit to override.')
end
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'War-FTPD 1.65 Username Overflow',
'Description' => %q{
This module exploits a buffer overflow found in the USER command
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Windows NtUserSetWindowFNID Win32k User Callback',
Method exploit
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
fail_with(Failure::None, 'Already running as SYSTEM') if is_system?
unless session.arch == ARCH_X64
fail_with(Failure::BadConfig, 'This exploit only supports x64 sessions')
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'MS16-032 Secondary Logon Handle Privilege Escalation',
Method exploit
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
fail_with(Failure::BadConfig, 'Must be a meterpreter session') unless session.type == 'meterpreter'
fail_with(Failure::NoAccess, 'Cannot use this technique as SYSTEM') if is_system?
domain = datastore['DOMAIN']
user = datastore['USER']
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'MS02-065 Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'ManageEngine ADAudit Plus CVE-2022-28219',
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => 'VMWare OVF Tools Format String Vulnerability',
'Description' => %q{
This module exploits a format string vulnerability in VMWare OVF Tools 2.1 for
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "Samsung NET-i Viewer Multiple ActiveX BackupToAvi() Remote Overflow",
'Description' => %q{
This module exploits a vulnerability in the CNC_Ctrl.dll ActiveX control installed
Method on_request_uri
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
# Check target before attacking
agent = request.headers['User-Agent']
if agent !~ /Windows NT 5\.1/ or agent !~ /Safari\/5/ or agent =~ /Chrome/
print_error("This target isn't supported: #{agent.to_s}")
Method on_request_uri
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
agent = request.headers['User-Agent']
print_status("User-agent: #{agent}")
Method get_payload
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def get_payload(t)
code = payload.encoded
# Both ROP chains generated by mona.py - See corelan.be
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'VMWare OVF Tools Format String Vulnerability',
'Description' => %q{
This module exploits a format string vulnerability in VMWare OVF Tools 2.1 for
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'IBM Personal Communications iSeries Access WorkStation 5.9 Profile',
'Description' => %q{
The IBM Personal Communications I-Series application WorkStation is susceptible to a
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Print Spooler Remote DLL Injection',
Method check
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check
sys_info = get_sysinfo
# Make sure both docker and runc are present
unless command_exists?('runc')
Method initialize
has 57 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Linux eBPF ALU32 32-bit Invalid Bounds Tracking LPE',