rapid7/metasploit-framework

View on GitHub

Showing 16,065 of 22,177 total issues

Avoid too many return statements within this method.
Open

    return true if uri =~ /(pcap|packet)\.dll/i
Severity: Major
Found in modules/exploits/windows/misc/vmhgfs_webdav_dll_sideload.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

          return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('2.06') && (@d_link['hardware'][0] == 'B' || @d_link['hardware'] == 'N/A')
    Severity: Major
    Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

            return true if Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.12') && @d_link['hardware'][0] == 'A'
      Severity: Major
      Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

              return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.12') && (@d_link['hardware'][0] == 'A' || @d_link['hardware'] == 'N/A')
        Severity: Major
        Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

                return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('2.05') && @d_link['hardware'][0] == 'B'
          Severity: Major
          Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                return Exploit::CheckCode::Safe
            Severity: Major
            Found in modules/exploits/windows/misc/altiris_ds_sqli.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                    return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('3.12') && @d_link['hardware'][0] == 'C'
              Severity: Major
              Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                      return Rex::Version.new(@d_link['firmware']) <= Rex::Version.new('1.08') && @d_link['hardware'][0] == 'A'
                Severity: Major
                Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                      return CheckCode::Detected("Product info: #{@d_link['product']}|#{@d_link['firmware']}|#{@d_link['hardware']}|#{@d_link['arch']}") unless @d_link['product'].nil?
                  Severity: Major
                  Found in modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb - About 30 mins to fix

                    Avoid too many return statements within this method.
                    Open

                          return CheckCode::Safe('Kernel config does not include CONFIG_BPF_SYSCALL')

                      Avoid too many return statements within this method.
                      Open

                                return false
                      Severity: Major
                      Found in modules/exploits/linux/local/overlayfs_priv_esc.rb - About 30 mins to fix

                        Avoid too many return statements within this method.
                        Open

                                    return true
                        Severity: Major
                        Found in modules/exploits/linux/local/overlayfs_priv_esc.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                                      return true
                          Severity: Major
                          Found in modules/exploits/linux/local/overlayfs_priv_esc.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                    return false
                            Severity: Major
                            Found in modules/exploits/linux/local/overlayfs_priv_esc.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                      return CheckCode::Safe('Target Fedora system is running a 5.11.20 kernel however it has been patched!')

                                Avoid too many return statements within this method.
                                Open

                                            return true
                                Severity: Major
                                Found in modules/exploits/linux/local/overlayfs_priv_esc.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                              return false
                                  Severity: Major
                                  Found in modules/exploits/linux/local/overlayfs_priv_esc.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                          return CheckCode::Appears("Version of runc detected appears to be vulnerable: #{unfiltered_version}.")
                                    Severity: Major
                                    Found in modules/exploits/linux/local/runc_cwd_priv_esc.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                          return CheckCode::Detected("#{suid_exe_path} is not readable") unless readable?(suid_exe_path)
                                      Severity: Major
                                      Found in modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb - About 30 mins to fix

                                        Avoid too many return statements within this method.
                                        Open

                                                return CheckCode::Safe('Target Ubuntu kernel version is running a 5.8.x build however it has updated to a patched version!')
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language