Showing 7,361 of 22,177 total issues
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Microsoft Error Reporting Local Privilege Elevation Vulnerability',
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Microsoft UPnP Local Privilege Elevation Vulnerability',
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'MS99-025 Microsoft IIS MDAC msadcs.dll RDS Arbitrary Remote Command Execution',
'Description' => %q{
This module can be used to execute arbitrary commands on IIS servers
Method execute_command
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def execute_command(cmd, _opts = {})
serialized = Rex::Text.encode_base64(::Msf::Util::DotNetDeserialization.generate(
cmd,
gadget_chain: :TextFormattingRunProperties,
formatter: :LosFormatter
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'DiskSavvy Enterprise GET Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "Adobe Flash Player 11.3 Kern Table Parsing Integer Overflow",
'Description' => %q{
This module exploits a vulnerability found in the ActiveX component of Adobe
Method on_request_uri
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
agent = request.headers['User-Agent']
my_target = get_target(agent)
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "Adobe Flash Player Integer Underflow Remote Code Execution",
'Description' => %q{
This module exploits a vulnerability found in the ActiveX component of Adobe Flash Player
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Delta Electronics InfraSuite Device Master Deserialization',
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'MS09-050 Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference',
'Description' => %q{
This module exploits an out of bounds function table dereference in the SMB
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Reliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation',
'Description' => %q{
This module attempts to gain root privileges on Linux systems by abusing
Method run_exploit
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_exploit(check)
if !datastore['ForceExploit'] && is_root?
fail_with(Failure::BadConfig, 'Session already has root privileges. Set ForceExploit to override.')
end
Method check
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def check
arch = kernel_hardware
# Could we potentially support x86? Yes, potentially. Will we? Well considering the 5.7 kernel was released
# in 2020 and official support for x64 kernels ended in 2012 with
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => "glibc 'realpath()' Privilege Escalation",
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Docker cgroups Container Escape',
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => '2021 Ubuntu Overlayfs LPE',
Method hijack_cookie
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def hijack_cookie
# Updating SSL and RPORT in order to communicate with HTTP proxy service.
if datastore['SSL']
ssl_restore = true
datastore['SSL'] = false
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Linksys WRT160nv2 apply.cgi Remote Command Injection',
'Description' => %q{
Some Linksys Routers are vulnerable to an authenticated OS command injection on
Method initialize
has 56 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'php imap_open Remote Code Execution',
'Description' => %q{
The imap_open function within php, if called without the /norsh flag, will attempt to preauthenticate an