Showing 7,361 of 22,177 total issues
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Trend Micro Threat Discovery Appliance admin_sys_time.cgi Remote Command Execution',
'Description' => %q{
This module exploits two vulnerabilities the Trend Micro Threat Discovery Appliance.
Method do_login
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def do_login
res = send_request_cgi(
{
'uri' => '/en-US/account/login',
'method' => 'GET'
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'JBoss Java Class DeploymentFileRepository WAR Deployment',
'Description' => %q{
This module uses the DeploymentFileRepository class in
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "Dell SonicWALL Scrutinizer 11.01 methodDetail SQL Injection",
'Description' => %q{
This module exploits a vulnerability found in Dell SonicWALL Scrutinizer. The methodDetail
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'qdPM 9.1 Authenticated Arbitrary PHP File Upload (RCE)',
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Moodle Teacher Enrollment Privilege Escalation to RCE',
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'PHP CGI Argument Injection',
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle Forms and Reports Remote Code Execution',
'Description' => %q{
This module uses two vulnerabilities in Oracle Forms and Reports to get remote code execution
Method exploit
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
payload_name = rand_text_alpha(rand(10) + 5) + '.php'
print_status("Using SQL injection to acquire credentials")
user = database_get_field('users', 'name', 0)
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Apple iOS Default SSH Password Vulnerability',
Method exploit
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if target.name =~ /Windows/
print_status("Creating payload vbs script")
encoded_payload = generate_payload_exe().unpack("H*").join
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'EasyFTP Server MKD Command Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'mySCADA MyPRO Authenticated Command Injection (CVE-2023-28384)',
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Lexmark Driver Privilege Escalation',
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Windows SetImeInfoEx Win32k NULL Pointer Dereference',
Method exploit
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# Make sure we meet the requirements before running the script
if !(session.type == "meterpreter" || have_powershell?)
print_error("Incompatible Environment")
return
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'HTTPDX h_handlepeer() Function Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability in HTTPDX HTTP server 1.4. The
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Computer Associates License Client GETCONFIG Overflow',
'Description' => %q{
This module exploits a vulnerability in the CA License Client
Method initialize
has 52 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'AdminStudio LaunchHelp.dll ActiveX Arbitrary Code Execution',