rapid7/metasploit-framework

View on GitHub

Showing 15,730 of 21,757 total issues

Avoid too many return statements within this method.
Open

      return Exploit::CheckCode::Vulnerable('Received ERROR_BAD_NET_NAME, implying the target is vulnerable.')
Severity: Major
Found in modules/exploits/windows/dcerpc/cve_2021_1675_printnightmare.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

          return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.05') && (@d_link['hardware'][0] == 'A' || @d_link['hardware'] == 'N/A')
    Severity: Major
    Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

            return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.04') && (@d_link['hardware'][0] == 'A' || @d_link['hardware'] == 'N/A')
      Severity: Major
      Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

                return CheckCode::Safe('Running a Fedora system with a kernel before kernel version 5.7 where the vulnerability was introduced')

          Avoid too many return statements within this method.
          Open

                return Exploit::CheckCode::Unknown
          Severity: Major
          Found in modules/exploits/windows/misc/ahsay_backup_fileupload.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                  return true if Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('2.03') && @d_link['hardware'][0] == 'B'
            Severity: Major
            Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                    return true if Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.12') && @d_link['hardware'][0] == 'A'
              Severity: Major
              Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                      return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.11') && @d_link['hardware'][0] == 'A'
                Severity: Major
                Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                          return CheckCode::Unknown('Unknown target kernel version, recommend manually checking if target kernel is vulnerable.')

                    Avoid too many return statements within this method.
                    Open

                          return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('2.06') && (@d_link['hardware'][0] == 'B' || @d_link['hardware'] == 'N/A')
                    Severity: Major
                    Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                      Avoid too many return statements within this method.
                      Open

                            return CheckCode::Detected('Could not retrieve kernel config')

                        Avoid too many return statements within this method.
                        Open

                              return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.04')
                        Severity: Major
                        Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                                return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.05') && @d_link['hardware'][0] == 'A'
                          Severity: Major
                          Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                  return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.08') && @d_link['hardware'][0] == 'A'
                            Severity: Major
                            Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                      return CheckCode::Safe('Target Ubuntu kernel version is running a 5.8.x build however it has updated to a patched version!')

                                Avoid too many return statements within this method.
                                Open

                                      return true if Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('2.04') && @d_link['hardware'][0] == 'B'
                                Severity: Major
                                Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                        return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.00') && @d_link['hardware'][0] == 'A'
                                  Severity: Major
                                  Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                        return CheckCode::Detected
                                    Severity: Major
                                    Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                            return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.12') && (@d_link['hardware'][0] == 'A' || @d_link['hardware'] == 'N/A')
                                      Severity: Major
                                      Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                                        Avoid too many return statements within this method.
                                        Open

                                              return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.12') && @d_link['hardware'][0] == 'A'
                                        Severity: Major
                                        Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language