Showing 7,361 of 22,177 total issues
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'ProFTPD 1.3.5 Mod_Copy Command Execution',
Method exploit
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
base = target_uri.path
base << '/' if base[-1, 1] != '/'
@upload_php = rand_text_alpha(rand(4) + 4) + ".php"
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'SugarCRM unserialize() PHP Code Execution',
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'ActiveMQ web shell upload',
'Description' => %q(
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "Atlassian HipChat for Jira Plugin Velocity Template Injection",
'Description' => %q{
Atlassian Hipchat is a web service for internal instant messaging. A plugin is available
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Jenkins-CI Script-Console Java Execution',
Method exploit
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
#initialise some base vars
@inject = "${#_memberAccess[\"allowStaticMethodAccess\"]=true,CMD}"
@java_upload_part_cmd = "#f=new java.io.FileOutputStream('FILENAME',APPEND),#f.write(new sun.misc.BASE64Decoder().decodeBuffer('BUFFER')), #f.close()"
#Set up generic values.
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell ZENworks Configuration Management Remote Execution',
'Description' => %q{
This module exploits a code execution flaw in Novell ZENworks Configuration
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP)',
'Description' => %q{
This module logs in to an Axis2 Web Admin Module instance using a specific user/pass
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Malicious Git HTTP Server For CVE-2017-1000117',
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize( info = {} )
super( update_info( info,
'Name' => 'Java storeImageArray() Invalid Array Indexing Vulnerability',
'Description' => %q{
This module abuses an Invalid Array Indexing Vulnerability on the
Method build_t3_request_object
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def build_t3_request_object
# data block is from EDB PoC
data = '000005c3016501ffffffffffffffff0000006a0000ea600000001900937b484a'
data << '56fa4a777666f581daa4f5b90e2aebfc607499b4027973720078720178720278'
data << '700000000a000000030000000000000006007070707070700000000a00000003'
Method execute_command
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def execute_command(cmd, _opts = {})
uri = target_uri.path
service_name = Rex::Text.rand_text_alpha(5..10)
print_status("Creating service '#{service_name}'")
Method exploit
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if (target.name =~ /Unix/)
connect
poof =
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Ghostscript Command Execution via Format String',
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'PHP IRC Bot pbot eval() Remote Code Execution',
'Description' => %q{
This module allows remote command execution on the PHP IRC bot pbot by abusing
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Sielco Sistemi Winlog Buffer Overflow 2.07.14 - 2.07.16',
'Description' => %q{
This module exploits a buffer overflow in Sielco Sistem Winlog <= 2.07.16.
Method exploit
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
@registry_key = ''
check_permissions!
case get_uac_level
when UAC_PROMPT_CREDS_IF_SECURE_DESKTOP,
Method initialize
has 51 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
{