rapid7/metasploit-framework

View on GitHub

Showing 7,361 of 22,177 total issues

Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(_info = {})
    super(
      'Name' => 'VMware vCenter Server Unauthenticated JNDI Injection RCE (via Log4Shell)',
      'Description' => %q{
        VMware vCenter Server is affected by the Log4Shell vulnerability whereby a JNDI string can sent to the server
Severity: Major
Found in modules/exploits/multi/http/vmware_vcenter_log4shell.rb - About 2 hrs to fix

    Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def initialize(info = {})
        super(
          update_info(
            info,
            'Name' => 'BoidCMS Command Injection',
    Severity: Major
    Found in modules/exploits/multi/http/cve_2023_38836_boidcms.rb - About 2 hrs to fix

      Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

        def initialize(info={})
          super(update_info(info,
            'Name'           => 'Drupal HTTP Parameter Key/Value SQL Injection',
            'Description'    => %q{
              This module exploits the Drupal HTTP Parameter Key/Value SQL Injection
      Severity: Major
      Found in modules/exploits/multi/http/drupal_drupageddon.rb - About 2 hrs to fix

        Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
        Open

          def initialize(info = {})
            super(update_info(info,
              'Name'           => 'HP Client Automation Command Injection',
              'Description'    => %q{
                This module exploits a command injection vulnerability on HP Client Automation, distributed
        Severity: Major
        Found in modules/exploits/multi/misc/persistent_hpca_radexec_exec.rb - About 2 hrs to fix

          Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
          Open

            def initialize(info = {})
              super(update_info(info,
                'Name'           => "Solaris 'EXTREMEPARR' dtappgather Privilege Escalation",
                'Description'    => %q{
                  This module exploits a directory traversal vulnerability in the
          Severity: Major
          Found in modules/exploits/solaris/local/extremeparr_dtappgather_priv_esc.rb - About 2 hrs to fix

            Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
            Open

              def initialize(info={})
                super(update_info(info,
                  'Name'           => "ICONICS WebHMI ActiveX Buffer Overflow",
                  'Description'    => %q{
                      This module exploits a vulnerability found in ICONICS WebHMI's ActiveX control.
            Severity: Major
            Found in modules/exploits/windows/scada/iconics_webhmi_setactivexguid.rb - About 2 hrs to fix

              Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
              Open

                def initialize(info = {})
                  super(
                    update_info(
                      info,
                      'Name' => 'Background Intelligent Transfer Service Arbitrary File Move Privilege Elevation Vulnerability',

                Method exploit has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                Open

                  def exploit
                    eventvwr_cmd = EVENTVWR_PATH
                    registry_view = REGISTRY_VIEW_NATIVE
                
                    # Make sure we have a sane payload configuration
                Severity: Major
                Found in modules/exploits/windows/local/bypassuac_eventvwr.rb - About 2 hrs to fix

                  Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                  Open

                    def initialize(info = {})
                      super(
                        update_info(
                          info,
                          'Name' => 'Micro Focus Operations Bridge Manager / Reporter Local Privilege Escalation',
                  Severity: Major
                  Found in modules/exploits/windows/local/microfocus_operations_privesc.rb - About 2 hrs to fix

                    Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                    Open

                      def initialize(info = {})
                        super(
                          update_info(
                            info,
                            'Name' => 'Microsoft Spooler Local Privilege Elevation Vulnerability',
                    Severity: Major
                    Found in modules/exploits/windows/local/cve_2020_1048_printerdemon.rb - About 2 hrs to fix

                      Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                      Open

                        def initialize(info = {})
                          super(
                            update_info(
                              info,
                              'Name' => 'HPE Systems Insight Manager AMF Deserialization RCE',
                      Severity: Major
                      Found in modules/exploits/windows/http/hpe_sim_76_amf_deserialization.rb - About 2 hrs to fix

                        Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                        Open

                          def initialize(info = {})
                            super(update_info(info,
                              'Name'           => 'HP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow',
                              'Description'    => %q{
                                  This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53
                        Severity: Major
                        Found in modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb - About 2 hrs to fix

                          Method run_bat_file_from_disk has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                          Open

                            def run_bat_file_from_disk(bat_file_name)
                              print_status("Running the .bat file: #{bat_file_name}")
                              csrf_token = get_csrf_token
                              sensor_name = Rex::Text.rand_text_alphanumeric(8..10)
                          
                          

                            Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                            Open

                              def initialize(info = {})
                                super(
                                  update_info(
                                    info,
                                    'Name' => 'PRTG CVE-2023-32781 Authenticated RCE',

                              Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                              Open

                                def initialize(info={})
                                  super(update_info(info,
                                    'Name'           => "MS11-093 Microsoft Windows OLE Object File Handling Remote Code Execution",
                                    'Description'    => %q{
                                        This module exploits a type confusion vulnerability in the OLE32 component of
                              Severity: Major
                              Found in modules/exploits/windows/browser/ms11_093_ole32.rb - About 2 hrs to fix

                                Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                                Open

                                  def initialize(info={})
                                    super(update_info(info,
                                      'Name'           => "Adobe Flash Player Regular Expression Heap Overflow",
                                      'Description'    => %q{
                                        This module exploits a vulnerability found in the ActiveX component of Adobe
                                Severity: Major
                                Found in modules/exploits/windows/browser/adobe_flash_regex_value.rb - About 2 hrs to fix

                                  Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                                  Open

                                    def initialize(info = {})
                                      super(update_info(info,
                                        'Name'                  => 'Microsoft Internet Explorer Unsafe Scripting Misconfiguration',
                                        'Description'           => %q{
                                          This exploit takes advantage of the "Initialize and script ActiveX controls not
                                  Severity: Major
                                  Found in modules/exploits/windows/browser/ie_unsafe_scripting.rb - About 2 hrs to fix

                                    Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                                    Open

                                      def initialize(info = {})
                                        super(update_info(info,
                                          'Name'           => 'Apple QuickTime TeXML Style Element Stack Buffer Overflow',
                                          'Description'    => %q{
                                              This module exploits a vulnerability found in Apple QuickTime. When handling
                                    Severity: Major
                                    Found in modules/exploits/windows/fileformat/apple_quicktime_texml.rb - About 2 hrs to fix

                                      Method on_request_uri has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                                      Open

                                        def on_request_uri(cli, request)
                                      
                                          if (!request.uri.match(/\?\w+/))
                                            send_local_redirect(cli, "?#{@javascript_encode_key}")
                                            return
                                      Severity: Major
                                      Found in modules/exploits/windows/browser/chilkat_crypt_writefile.rb - About 2 hrs to fix

                                        Method initialize has 61 lines of code (exceeds 25 allowed). Consider refactoring.
                                        Open

                                          def initialize(info={})
                                            super(update_info(info,
                                              'Name'           => "MS11-038 Microsoft Office Excel Malformed OBJ Record Handling Overflow",
                                              'Description'    => %q{
                                                  This module exploits a vulnerability found in Excel 2002 of Microsoft Office XP.
                                        Severity: Major
                                        Found in modules/exploits/windows/fileformat/ms10_038_excel_obj_bof.rb - About 2 hrs to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language