Showing 7,361 of 22,177 total issues
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(_info = {})
super(
'Name' => 'UniFi Network Application Unauthenticated JNDI Injection RCE (via Log4Shell)',
'Description' => %q{
The Ubiquiti UniFi Network Application versions 5.13.29 through 6.5.53 are affected by the Log4Shell
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Adobe ColdFusion RDS Authentication Bypass',
'Description' => %q{
Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote
Method exploit
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
@attempted_login = false
@uri = target_uri
@uri.path = normalize_uri(@uri.path)
@uri.path << '/' if @uri.path[-1, 1] != '/'
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Mutiny Remote Command Execution',
'Description' => %q{
This module exploits an authenticated command injection vulnerability in the
Method generate_html
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def generate_html(target_info,refer)
injection = if target_info[:ua_ver].to_i == 15
"Function.prototype.call.call(p.__defineGetter__,obj,key,runme);"
else
"p2.constructor.defineProperty(obj,key,{get:runme});"
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Unauthenticated remote code execution in Ignition',
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize( info = {} )
super( update_info( info,
'Name' => 'Java Applet ProviderSkeleton Insecure Invoke Method',
'Description' => %q{
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Hashicorp Consul Remote Command Execution via Services API',
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'FreeBSD Intel SYSRET Privilege Escalation',
Method exploit
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
my_target = target
if my_target.name == 'Automatic'
print_status("Automatically detecting the target")
connect
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'QNX qconn Command Execution',
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'PsExec via Current User Token',
Method exploit
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# did the operator specify a custom DLL? If not...
if datastore['DLLPATH']
# otherwise, just use their provided DLL and assume they compiled everything correctly
# there is no way to check if it's compiled correctly anyway
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'EasyFTP Server list.html path Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11
Method write_bat_file_to_disk
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def write_bat_file_to_disk(cmd)
# Uses the HL7Sensor for writing a .bat file to the disk
cmd = cmd.gsub! '\\', '\\\\\\'
print_status('Writing .bat to disk')
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => "Honeywell Tema Remote Installer ActiveX Remote Code Execution",
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'PointDev IDEAL Migration Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in versions v9.7
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => "Microsoft Office Word Malicious Hta Execution",
'Description' => %q{
This module creates a malicious RTF file that when opened in