rapid7/metasploit-framework

View on GitHub

Showing 4,139 of 21,886 total issues

Avoid too many return statements within this method.
Open

                  return "#{cred.id}:#{Regexp.last_match(1).scan(/.{1,40}/m).join(':').downcase}"
Severity: Major
Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

                  return ['bf']
    Severity: Major
    Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

                      return "#{cred.private.data}:"
      Severity: Major
      Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

                        return "#{cred.id}:$cram_md5$#{Rex::Text.encode_base64(data[0])}$#{password}"
        Severity: Major
        Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

                          return "#{cred.public.username}:#{cred.private.data.upcase}:::::#{cred.id}:"
          Severity: Major
          Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                            return "$vnc$#{cred.private.data.start_with?('*') ? cred.private.data.upcase : "*#{cred.private.data.upcase}"}"
            Severity: Major
            Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                                return "#{cred.public.username.upcase}:$dynamic_1506$#{Regexp.last_match(1)}:#{cred.id}:"
              Severity: Major
              Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                              return ['pbkdf2,oracle12c']
                Severity: Major
                Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                                  return "#{cred.private.data}::::::#{cred.id}:"
                  Severity: Major
                  Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

                    Avoid too many return statements within this method.
                    Open

                                  return ['des']
                    Severity: Major
                    Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

                      Avoid too many return statements within this method.
                      Open

                                  return "Connection failed" if res.nil?
                      Severity: Major
                      Found in lib/metasploit/framework/login_scanner/glassfish.rb - About 30 mins to fix

                        Avoid too many return statements within this method.
                        Open

                                      return ['bsdi']
                        Severity: Major
                        Found in lib/metasploit/framework/password_crackers/jtr/formatter.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                                            return "#{cred.id}:#{hash}:#{salt}"
                          Severity: Major
                          Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                            return "#{cred.id}:#{cred.private.data.sub('$HEX$', ':').sub('$dynamic_82$', '')}"
                            Severity: Major
                            Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                              return "#{cred.id}:#{cred.private.data}"
                              Severity: Major
                              Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

                                Avoid too many return statements within this method.
                                Open

                                                return "#{cred.id}:#{cred.private.data.split(':').first}"
                                Severity: Major
                                Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                                  return "#{cred.id}:#{cred.private.data.downcase.sub('*', '')}"
                                  Severity: Major
                                  Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                                    return "#{cred.id}:#{cred.private.data}"
                                    Severity: Major
                                    Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                                      return "#{cred.id}:#{cred.private.data}"
                                      Severity: Major
                                      Found in lib/metasploit/framework/password_crackers/hashcat/formatter.rb - About 30 mins to fix
                                        Severity
                                        Category
                                        Status
                                        Source
                                        Language