rapid7/metasploit-framework

View on GitHub

Showing 15,730 of 21,757 total issues

Avoid too many return statements within this method.
Open

    return true if uri =~ /(pcap|packet)\.dll/i
Severity: Major
Found in modules/exploits/windows/misc/vmhgfs_webdav_dll_sideload.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

        return Exploit::CheckCode::Safe
    Severity: Major
    Found in modules/exploits/windows/misc/altiris_ds_sqli.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

            return Exploit::CheckCode::Unknown('Received unknown status code, implying the target is not vulnerable.')
      Severity: Major
      Found in modules/exploits/windows/dcerpc/cve_2021_1675_printnightmare.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

              return Msf::Exploit::CheckCode::Unknown
        Severity: Major
        Found in modules/exploits/windows/smb/ipass_pipe_exec.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

                return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.02') && (@d_link['hardware'][0] == 'A' || @d_link['hardware'] == 'N/A')
          Severity: Major
          Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                  return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.06') && @d_link['hardware'][0] == 'A'
            Severity: Major
            Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                      return CheckCode::Safe("Target Fedora kernel version is #{major_version}-#{minor_version} which is not vulnerable!")

                Avoid too many return statements within this method.
                Open

                      return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.03') && @d_link['hardware'][0] == 'A'
                Severity: Major
                Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                        return CheckCode::Safe('grsecurity is in use')

                    Avoid too many return statements within this method.
                    Open

                          return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.07') && @d_link['hardware'][0] == 'A'
                    Severity: Major
                    Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                      Avoid too many return statements within this method.
                      Open

                            return CheckCode::Unknown("Target is not a known target, so we can't check if the target is vulnerable or not!")

                        Avoid too many return statements within this method.
                        Open

                              return Exploit::CheckCode::Vulnerable('Received ERROR_PATH_NOT_FOUND, implying the target is vulnerable.')
                        Severity: Major
                        Found in modules/exploits/windows/dcerpc/cve_2021_1675_printnightmare.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                                return Exploit::CheckCode::Safe('Received ERROR_ACCESS_DENIED implying the target is patched.')
                          Severity: Major
                          Found in modules/exploits/windows/dcerpc/cve_2021_1675_printnightmare.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                  return CheckCode::Safe('Kernel config does not include CONFIG_BPF_SYSCALL')

                              Avoid too many return statements within this method.
                              Open

                                      return Exploit::CheckCode::Unknown
                              Severity: Major
                              Found in modules/exploits/windows/misc/ahsay_backup_fileupload.rb - About 30 mins to fix

                                Avoid too many return statements within this method.
                                Open

                                      return true if Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.10') && @d_link['hardware'][0] == 'A'
                                Severity: Major
                                Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                        return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('3.12') && @d_link['hardware'][0] == 'C'
                                  Severity: Major
                                  Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                          return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.12') && @d_link['hardware'][0] == 'A'
                                    Severity: Major
                                    Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                              return CheckCode::Safe('Target Fedora system is running a 5.11.20 kernel however it has been patched!')

                                        Avoid too many return statements within this method.
                                        Open

                                              return CheckCode::Detected('rds.ko kernel module is not loaded, but may be autoloaded during exploitation')
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language