Showing 7,361 of 22,177 total issues
Method exploit
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if target.name =~ /Windows 7/ # Plus Windows Vista
virtualprotect =
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Anviz CrossChex Buffer Overflow',
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Mini-Stream 3.0.1.1 Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Mini-Stream 3.0.1.1
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Glibc Tunables Privilege Escalation CVE-2023-4911 (aka Looney Tunables)',
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Linux Kernel Sendpage Local Privilege Escalation',
'Description' => %q{
The Linux kernel failed to properly initialize some entries in the
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Ivanti Connect Secure Unauthenticated Remote Code Execution',
Method exploit
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
print_status('Encoding the payload as a .jsp file')
payload = Msf::Util::EXE.to_jsp(generate_payload_exe)
# Create a file
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Micro Focus Operations Bridge Reporter Unauthenticated Command Injection',
Method execute_command
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def execute_command(cmd, _opts = {})
if !@nsp || !@auth_cookies # Check to see if we already authenticated during the check
auth_result, err_msg, @auth_cookies, @version, @nsp = authenticate(username, password, finish_install, true, true, true)
case auth_result
when AUTH_RESULTS[:connection_failed]
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Ray Agent Job RCE',
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Linksys E1500/E2500 apply.cgi Remote Command Injection',
'Description' => %q{
Some Linksys Routers are vulnerable to an authenticated OS command injection.
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Linksys E-Series TheMoon Remote Command Injection',
'Description' => %q{
Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "Openfiler v2.x NetworkCard Command Execution",
'Description' => %q{
This module exploits a vulnerability in Openfiler v2.x
Method exploit
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# first we authenticate
@cookie = rand_text_alpha_lower(7)
res = send_request_cgi({
Method run
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
# Get device prompt
prompt = session.shell_command('')
# Set terminal length to 0 so no paging is required
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Multi Gather Firefox Signon Credential Collection',
Method run
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
fail_with(Failure::BadConfig, 'Invalid session ID selected.') if client.nil?
fail_with(Failure::BadConfig, 'Invalid action') if action.nil?
num_chunks = (datastore['RECORD_LEN'].to_f / datastore['SYNC_WAIT'].to_f).ceil
Method handle_response
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def handle_response(cli, request_uri)
uripath = get_resource.chomp('/')
# Convert http://127.0.0.1/URIPATH/file/ -> /file
if request_uri != uripath && request_uri.starts_with?(uripath)
Method initialize
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Windows Gather Exchange Server Mailboxes',
Method decrypt_vom_db
has 54 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def decrypt_vom_db(csv_dataset)
current_row = 0
decrypted_rows = 0
plaintext_rows = 0
blank_rows = 0