Showing 7,361 of 22,177 total issues
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Apache Struts ClassLoader Manipulation Remote Code Execution',
'Description' => %q{
This module exploits a remote command execution vulnerability in Apache Struts versions
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Apache 2.4.49/2.4.50 Traversal RCE',
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Microsoft Exchange ProxyNotShell RCE',
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => "HP NNM CGI webappmon.exe OvJavaLocale Buffer Overflow",
'Description' => %q{
This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53.
Method drop_and_execute_payload
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def drop_and_execute_payload
bdcm_data = "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<Model
xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"
xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" Name=\"BDCMetadata\"
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super( update_info(info,
'Name' => 'TeeChart Professional ActiveX Control Trusted Integer Dereference',
'Description' => %q{
This module exploits an integer overflow in TeeChart Pro ActiveX control. When
Method make_pdf
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def make_pdf(js)
xref = []
eol = "\n"
endobj = "endobj" << eol
Method exploit
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# In order to save binary data to the file system the payload is written to a .vbs
# file and execute it from there.
@payload_name = rand_text_alpha(4)
@temp_folder = "/Windows/Temp"
Method make_pdf
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def make_pdf(js)
xref = []
eol = "\n"
endobj = "endobj" << eol
Method exploit
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
connect(versions: [1])
login_time = Time.now
smb_login()
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Sudo Heap-Based Buffer Overflow',
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Libuser roothelper Privilege Escalation',
Method exploit
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
check_status = check
if check_status == CheckCode::Appears
print_good 'The target appears to be vulnerable'
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'VMware vCenter Server Virtual SAN Health Check Plugin RCE',
Method grab_config
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def grab_config(user,pass)
print_status("#{rhost}:#{rport} - Trying to download the original configuration")
begin
res = send_request_cgi({
'uri' => '/index.asp',
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'VMWare Aria Operations for Networks (vRealize Network Insight) pre-authenticated RCE',
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Optergy Proton and Enterprise BMS Command Injection using a backdoor',
Method initialize
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Mida Solutions eFramework ajaxreq.php Command Injection',
Method exploit
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if (datastore['SRVHOST'] == '0.0.0.0') || (datastore['SRVHOST'] == '::')
fail_with(Failure::Unreachable, "#{peer} - Please specify the LAN IP address of this computer in SRVHOST")
end
Method exploit
has 72 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
uuid = SecureRandom.uuid
ldap_port = datastore["SRVPORT"]
ldap_host = datastore["SRVHOST"]