rapid7/metasploit-framework

View on GitHub

Showing 15,888 of 21,960 total issues

Avoid too many return statements within this method.
Open

      return nil
Severity: Major
Found in modules/exploits/linux/http/cisco_rv32x_rce.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

          return CheckCode::Appears("Target is EyesOfNetwork 5.2 with API version #{api_version}.")
    Severity: Major
    Found in modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

            return CheckCode::Detected('Could not determine EyesOfNetwork version.')
      Severity: Major
      Found in modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

                return
        Severity: Major
        Found in modules/exploits/linux/http/php_imap_open_rce.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

                  return
          Severity: Major
          Found in modules/exploits/linux/http/php_imap_open_rce.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                  return CheckCode::Appears("Target is EyesOfNetwork 5.3 or older with API version #{api_version}.")
            Severity: Major
            Found in modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                      return
              Severity: Major
              Found in modules/exploits/linux/http/php_imap_open_rce.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                        return
                Severity: Major
                Found in modules/exploits/linux/http/php_imap_open_rce.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                        return CheckCode::Safe('Target is not an EyesOfNetwork application.')
                  Severity: Major
                  Found in modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb - About 30 mins to fix

                    Avoid too many return statements within this method.
                    Open

                          return CheckCode::Safe("Target is EyesOfNetwork with API version #{api_version}.")
                    Severity: Major
                    Found in modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb - About 30 mins to fix

                      Avoid too many return statements within this method.
                      Open

                          return CheckCode::Safe(check_comment) unless res.body.include?('<reply result="ok">') != 200
                      Severity: Major
                      Found in modules/exploits/linux/http/axis_app_install.rb - About 30 mins to fix

                        Avoid too many return statements within this method.
                        Open

                              return CheckCode::Detected("Could not determine EyesOfNetwork version. API version is #{api_version}")
                        Severity: Major
                        Found in modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                              return Exploit::CheckCode::Save
                          Severity: Major
                          Found in modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                return CheckCode::Appears('It appears the target executed the provided sleep command.') unless res
                            Severity: Major
                            Found in modules/exploits/linux/http/hikvision_cve_2021_36260_blind.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                  return CheckCode::Safe
                              Severity: Major
                              Found in modules/exploits/linux/http/nagios_xi_configwizards_authenticated_rce.rb - About 30 mins to fix

                                Avoid too many return statements within this method.
                                Open

                                    return CheckCode::Safe('Blind command injection failed.') unless elapsed_time >= sleep_time
                                Severity: Major
                                Found in modules/exploits/linux/http/totolink_unauth_rce_cve_2023_30013.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                          return CheckCode::Appears("The target is OpenTSDB version #{version}")
                                  Severity: Major
                                  Found in modules/exploits/linux/http/opentsdb_key_cmd_injection.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                            return
                                    Severity: Major
                                    Found in modules/exploits/linux/http/php_imap_open_rce.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                            return Exploit::CheckCode::Appears if build < '3810'
                                      Severity: Major
                                      Found in modules/exploits/linux/http/synology_dsm_sliceupload_exec_noauth.rb - About 30 mins to fix

                                        Avoid too many return statements within this method.
                                        Open

                                              return CheckCode::Detected('Could not determine the OpenTSDB version: the HTTP response body did not match the expected JSON format.')
                                        Severity: Major
                                        Found in modules/exploits/linux/http/opentsdb_key_cmd_injection.rb - About 30 mins to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language