Showing 7,361 of 22,177 total issues
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Mac OS X Sudo Password Bypass',
'Description' => %q{
This module gains a session with root permissions on versions of OS X with
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Subversion Date Svnserve',
'Description' => %q{
This is an exploit for the Subversion date parsing overflow. This
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)',
'Description' => %q{
This module exploits the Shellshock vulnerability, a flaw in how the Bash shell
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Fortra GoAnywhere MFT Unsafe Deserialization RCE',
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Apache Struts 2 Namespace Redirect OGNL Injection',
'Description' => %q{
This module exploits a remote code execution vulnerability in Apache Struts
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'ManageEngine Multiple Products Authenticated File Upload',
'Description' => %q{
This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk,
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info={})
super(update_info(info,
'Name' => 'Oracle Weblogic Server Deserialization RCE - MarshalledObject',
'Description' => %q{
An unauthenticated attacker with network access to the Oracle Weblogic Server T3
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Solaris RSH Stack Clash Privilege Escalation',
'Description' => %q{
This module exploits a vulnerability in RSH on unpatched Solaris
Method exploit
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# This is the temporary path created in the spool directory
spath = "/var/spool/print"
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'FreeBSD rtld execl() Privilege Escalation',
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Rockwell FactoryTalk View SE SCADA Unauthenticated Remote Code Execution',
Method exploit
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
# Define default values
rvbs_name = datastore['VBS_NAME'] || Rex::Text.rand_text_alpha((rand(8) + 6))
rexe_name = datastore['EXE_NAME'] || Rex::Text.rand_text_alpha((rand(8) + 6))
reg_val = datastore['REG_NAME'] || Rex::Text.rand_text_alpha((rand(8) + 6))
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Razer Synapse rzpnk.sys ZwOpenProcess',
Method exploit
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if is_system?
fail_with(Failure::None, 'Session is already elevated')
end
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'DiskBoss Enterprise GET Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Sysax Multi Server 5.64 Create Folder Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in the create folder function in
Method process_propfind
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def process_propfind(cli, request, target)
path = request.uri
print_status("Received WebDAV PROPFIND request")
body = ''
Method process_propfind
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def process_propfind(cli, request)
path = request.uri
vprint_status("Received WebDAV PROPFIND request from: #{path}")
body = ''
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'MS09-067 Microsoft Excel Malformed FEATHEADER Record Vulnerability',
'Description' => %q{
This module exploits a vulnerability in the handling of the FEATHEADER record
Method initialize
has 65 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'ABRT raceabrt Privilege Escalation',