Showing 7,361 of 22,177 total issues
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize( info = {} )
super( update_info( info,
'Name' => 'Java Applet AverageRangeStatisticImpl Remote Code Execution',
'Description' => %q{
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Evince CBT File Command Injection',
'Description' => %q{
This module exploits a command injection vulnerability in Evince
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Solaris libnspr NSPR_LOG_FILE Privilege Escalation',
'Description' => %q{
This module exploits an arbitrary file write vulnerability in the
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'CitectSCADA/CitectFacilities ODBC Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in CitectSCADA's ODBC daemon.
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'ifwatchd Privilege Escalation',
Method exploit
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# Infoleak 1 (project listing)
print_status("#{peer} - Listing projects on the server")
res = send_to_factory('/hmi_isapi.dll?GetHMIProjects')
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'WMI Event Subscription Persistence',
'Description' => %q{
This module will create a permanent WMI event subscription to achieve file-less persistence using one
Method login
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def login
login_uri = normalize_uri(target_uri.path, 'user-login.html')
unless @random_value
res = send_request_cgi('method' => 'GET', 'uri' => login_uri)
fail_with(Failure::UnexpectedReply, 'Unable to reach login page') unless res
Method exploit
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
print_status("Generating the EXE Payload and the XSLT...")
fingerprint = rand_text_alpha(5 + rand(5))
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'KeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability',
'Description' => %q{
This module exploits a code execution vulnerability in the KeyScript ActiveX
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'SonicWALL Aventail epi.dll AuthCredential Format String',
'Description' => %q{
This module exploits a format string vulnerability within version 10.0.4.x and
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => "IBM Lotus Notes Client URL Handler Command Injection",
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'MS12-037 Microsoft Internet Explorer Fixed Table Col Span Heap Overflow',
'Description' => %q{
This module exploits a heap overflow vulnerability in Internet Explorer caused
Method on_request_uri
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Watermark Master Buffer Overflow (SEH)',
'Description' => %q{
This module exploits a stack based buffer overflow in Watermark Master 2.2.23 when
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "DVD X Player 5.5 .plf PlayList Buffer Overflow",
'Description' => %q{
This module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'ALLMediaServer 0.8 Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in ALLMediaServer 0.8. The vulnerability
Method initialize
has 55 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'GIMP script-fu Server Buffer Overflow',
'Description' => %q{
This module exploits a buffer overflow in the script-fu server