rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize( info = {} )

    super( update_info( info,
      'Name'          => 'Java Applet AverageRangeStatisticImpl Remote Code Execution',
      'Description'   => %q{

    Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(update_info(info,
          'Name'           => 'Evince CBT File Command Injection',
          'Description'    => %q{
            This module exploits a command injection vulnerability in Evince
    Severity: Major
    Found in modules/exploits/multi/fileformat/evince_cbt_cmd_injection.rb - About 2 hrs to fix

      Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def initialize(info = {})
          super(update_info(info,
            'Name'           => 'Solaris libnspr NSPR_LOG_FILE Privilege Escalation',
            'Description'    => %q{
              This module exploits an arbitrary file write vulnerability in the
      Severity: Major
      Found in modules/exploits/solaris/local/libnspr_nspr_log_file_priv_esc.rb - About 2 hrs to fix

        Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(update_info(info,
              'Name'           => 'CitectSCADA/CitectFacilities ODBC Buffer Overflow',
              'Description'    => %q{
                This module exploits a stack buffer overflow in CitectSCADA's ODBC daemon.
        Severity: Major
        Found in modules/exploits/windows/scada/citect_scada_odbc.rb - About 2 hrs to fix

          Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def initialize(info = {})
              super(
                update_info(
                  info,
                  'Name' => 'ifwatchd Privilege Escalation',
          Severity: Major
          Found in modules/exploits/qnx/local/ifwatchd_priv_esc.rb - About 2 hrs to fix

            Method exploit has 55 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def exploit
                # Infoleak 1 (project listing)
                print_status("#{peer} - Listing projects on the server")
                res = send_to_factory('/hmi_isapi.dll?GetHMIProjects')
            
            
            Severity: Major
            Found in modules/exploits/windows/scada/rockwell_factorytalk_rce.rb - About 2 hrs to fix

              Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(
                    update_info(
                      info,
                      {
              Severity: Major
              Found in modules/exploits/windows/local/ntapphelpcachecontrol.rb - About 2 hrs to fix

                Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info = {})
                    super(
                      update_info(
                        info,
                        {
                Severity: Major
                Found in modules/exploits/windows/local/ms15_078_atmfd_bof.rb - About 2 hrs to fix

                  Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def initialize(info = {})
                      super(update_info(info,
                        'Name'             => 'WMI Event Subscription Persistence',
                        'Description'      => %q{
                            This module will create a permanent WMI event subscription to achieve file-less persistence using one
                  Severity: Major
                  Found in modules/exploits/windows/local/wmi_persistence.rb - About 2 hrs to fix

                    Method login has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def login
                        login_uri = normalize_uri(target_uri.path, 'user-login.html')
                        unless @random_value
                          res = send_request_cgi('method' => 'GET', 'uri' => login_uri)
                          fail_with(Failure::UnexpectedReply, 'Unable to reach login page') unless res
                    Severity: Major
                    Found in modules/exploits/windows/http/zentao_pro_rce.rb - About 2 hrs to fix

                      Method exploit has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def exploit
                      
                          print_status("Generating the EXE Payload and the XSLT...")
                          fingerprint = rand_text_alpha(5 + rand(5))
                      
                      
                      Severity: Major
                      Found in modules/exploits/windows/http/ektron_xslt_exec.rb - About 2 hrs to fix

                        Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize(info = {})
                            super(update_info(info,
                              'Name'           => 'KeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability',
                              'Description'    => %q{
                                  This module exploits a code execution vulnerability in the KeyScript ActiveX
                        Severity: Major
                        Found in modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb - About 2 hrs to fix

                          Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info = {})
                              super(update_info(info,
                                'Name'           => 'SonicWALL Aventail epi.dll AuthCredential Format String',
                                'Description'    => %q{
                                    This module exploits a format string vulnerability within version 10.0.4.x and
                          Severity: Major
                          Found in modules/exploits/windows/browser/aventail_epi_activex.rb - About 2 hrs to fix

                            Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize(info = {})
                                super(
                                  update_info(
                                    info,
                                    'Name' => "IBM Lotus Notes Client URL Handler Command Injection",
                            Severity: Major
                            Found in modules/exploits/windows/browser/notes_handler_cmdinject.rb - About 2 hrs to fix

                              Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(update_info(info,
                                    'Name'           => 'MS12-037 Microsoft Internet Explorer Fixed Table Col Span Heap Overflow',
                                    'Description'    => %q{
                                        This module exploits a heap overflow vulnerability in Internet Explorer caused
                              Severity: Major
                              Found in modules/exploits/windows/browser/ms12_037_ie_colspan.rb - About 2 hrs to fix

                                Method on_request_uri has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def on_request_uri(cli, request)
                                
                                    # Re-generate the payload
                                    return if ((p = regenerate_payload(cli)) == nil)
                                
                                
                                Severity: Major
                                Found in modules/exploits/windows/browser/ms06_013_createtextrange.rb - About 2 hrs to fix

                                  Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(update_info(info,
                                        'Name'    => 'Watermark Master Buffer Overflow (SEH)',
                                        'Description'  => %q{
                                            This module exploits a stack based buffer overflow in Watermark Master 2.2.23 when
                                  Severity: Major
                                  Found in modules/exploits/windows/fileformat/watermark_master.rb - About 2 hrs to fix

                                    Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize(info={})
                                        super(update_info(info,
                                          'Name'           => "DVD X Player 5.5 .plf PlayList Buffer Overflow",
                                          'Description'    => %q{
                                              This module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and
                                    Severity: Major
                                    Found in modules/exploits/windows/fileformat/dvdx_plf_bof.rb - About 2 hrs to fix

                                      Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(update_info(info,
                                            'Name'           => 'ALLMediaServer 0.8 Buffer Overflow',
                                            'Description'    => %q{
                                              This module exploits a stack buffer overflow in ALLMediaServer 0.8. The vulnerability
                                      Severity: Major
                                      Found in modules/exploits/windows/misc/allmediaserver_bof.rb - About 2 hrs to fix

                                        Method initialize has 55 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(update_info(info,
                                              'Name'           => 'GIMP script-fu Server Buffer Overflow',
                                              'Description'    => %q{
                                                This module exploits a buffer overflow in the script-fu server
                                        Severity: Major
                                        Found in modules/exploits/windows/misc/gimp_script_fu.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language