rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Rejetto HTTP File Server (HFS) Unauthenticated Remote Code Execution',
Severity: Major
Found in modules/exploits/windows/http/rejetto_hfs_rce_cve_2024_23692.rb - About 2 hrs to fix

    Method ropchain has 51 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

        def ropchain(target)
          rop = ''
          # These bytes "\x43" are sacrificed ; we align the stack to jump over this messed up crap.
          stack_align = "\x43" * 16
    
    
    Severity: Major
    Found in modules/exploits/windows/http/geutebrueck_gcore_x64_rce_bo.rb - About 2 hrs to fix

      Method exploit has 51 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def exploit
      
          print_status("Trying target #{target.name}...")
      
          cgi = '/OvCgi/jovgraph.exe'
      Severity: Major
      Found in modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb - About 2 hrs to fix

        Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(
              update_info(
                info,
                'Name' => 'NETGEAR ProSafe Network Management System 300 Arbitrary File Upload',
        Severity: Major
        Found in modules/exploits/windows/http/netgear_nms_rce.rb - About 2 hrs to fix

          Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def initialize(info = {})
              super(
                update_info(
                  info,
                  'Name' => 'NFR Agent FSFUI Record File Upload RCE',
          Severity: Major
          Found in modules/exploits/windows/novell/file_reporter_fsfui_upload.rb - About 2 hrs to fix

            Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info = {})
                super(update_info(info,
                  'Name'           => 'MS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution',
                  'Description'    => %q{
                    This bug is triggered when the browser handles a JavaScript 'onLoad' handler in
            Severity: Major
            Found in modules/exploits/windows/browser/ms05_054_onload.rb - About 2 hrs to fix

              Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info={})
                  super(update_info(info,
                    'Name'                => 'Adobe Flash Player domainMemory ByteArray Use After Free',
                    'Description'         => %q{
                      This module exploits a use-after-free vulnerability in Adobe Flash Player. The
              Severity: Major
              Found in modules/exploits/windows/browser/adobe_flash_domain_memory_uaf.rb - About 2 hrs to fix

                Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def initialize(info={})
                    super(update_info(info,
                      'Name'           => "MS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution",
                      'Description'    => %q{
                        This module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows
                Severity: Major
                Found in modules/exploits/windows/fileformat/ms13_071_theme.rb - About 2 hrs to fix

                  Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def initialize(info = {})
                      super(update_info(info,
                        'Name'           => 'UltraISO CCD File Parsing Buffer Overflow',
                        'Description'    => %q{
                            This module exploits a stack-based buffer overflow in EZB Systems, Inc's
                  Severity: Major
                  Found in modules/exploits/windows/fileformat/ultraiso_ccd.rb - About 2 hrs to fix

                    Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def initialize(info = {})
                        super(update_info(info,
                          'Name'           => 'Free MP3 CD Ripper 1.1 WAV File Stack Buffer Overflow',
                          'Description'    => %q{
                              This module exploits a stack based buffer overflow found in Free MP3 CD
                    Severity: Major
                    Found in modules/exploits/windows/fileformat/free_mp3_ripper_wav.rb - About 2 hrs to fix

                      Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(update_info(info,
                            'Name'           => 'MediaCoder .M3U Buffer Overflow',
                            'Description'    => %q{
                                This module exploits a buffer overflow in MediaCoder 0.8.22. The vulnerability
                      Severity: Major
                      Found in modules/exploits/windows/fileformat/mediacoder_m3u.rb - About 2 hrs to fix

                        Method generate_rop has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def generate_rop(rvas)
                            # ROP fun! (XP SP3 English, Dec 29 2010)
                            rvas.merge!({
                              # Instructions / Name    => RVA
                              'BaseAddress'            => 0x01000000,
                        Severity: Major
                        Found in modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb - About 2 hrs to fix

                          Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def initialize(info={})
                              super(update_info(info,
                                'Name'           => "OpenOffice OLE Importer DocumentSummaryInformation Stream Handling Overflow",
                                'Description'    => %q{
                                    This module exploits a vulnerability in OpenOffice 2.3.1 and 2.3.0 on
                          Severity: Major
                          Found in modules/exploits/windows/fileformat/openoffice_ole.rb - About 2 hrs to fix

                            Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize(info = {})
                                super(update_info(info,
                                  'Name'           => 'BulletProof FTP Client BPS Buffer Overflow',
                                  'Description'    => %q{
                                      This module exploits a stack-based buffer overflow vulnerability in
                            Severity: Major
                            Found in modules/exploits/windows/fileformat/bpftp_client_bps_bof.rb - About 2 hrs to fix

                              Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info = {})
                                  super(update_info(info,
                                    'Name'           => 'VisiWave VWR File Parsing Vulnerability',
                                    'Description'    => %q{
                                      This module exploits a vulnerability found in VisiWave's Site Survey Report application.
                              Severity: Major
                              Found in modules/exploits/windows/fileformat/visiwave_vwr_type.rb - About 2 hrs to fix

                                Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info = {})
                                    super(update_info(info,
                                      'Name'           => 'Free Download Manager Torrent Parsing Buffer Overflow',
                                      'Description'    => %q{
                                          This module exploits a stack buffer overflow in Free Download Manager
                                Severity: Major
                                Found in modules/exploits/windows/fileformat/fdm_torrent.rb - About 2 hrs to fix

                                  Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info={})
                                      super(update_info(info,
                                        'Name'           => "AwindInc SNMP Service Command Injection",
                                        'Description'    => %q{
                                          This module exploits a vulnerability found in AwindInc and OEM'ed products where untrusted inputs are fed to ftpfw.sh system command, leading to command injection.
                                  Severity: Major
                                  Found in modules/exploits/linux/snmp/awind_snmp_exec.rb - About 2 hrs to fix

                                    Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize(info = {})
                                        super(
                                          update_info(
                                            info,
                                            'Name' => 'runc (docker) File Descriptor Leak Privilege Escalation',
                                    Severity: Major
                                    Found in modules/exploits/linux/local/runc_cwd_priv_esc.rb - About 2 hrs to fix

                                      Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def initialize(info = {})
                                          super(
                                            update_info(
                                              info,
                                              'Name' => 'Apache Tomcat on RedHat Based Systems Insecure Temp Config Privilege Escalation',
                                      Severity: Major
                                      Found in modules/exploits/linux/local/tomcat_rhel_based_temp_priv_esc.rb - About 2 hrs to fix

                                        Method initialize has 51 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info = {})
                                            super(
                                              update_info(
                                                info,
                                                'Name' => 'Local Privilege Escalation via CVE-2023-0386',
                                        Severity: Major
                                        Found in modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language