Showing 16,065 of 22,177 total issues
Avoid too many return
statements within this method. Open
Open
return Rex::Version.new(@glinet['firmware']) >= Rex::Version.new('4.0.0') && Rex::Version.new(@glinet['firmware']) < Rex::Version.new('4.5.0')
Avoid too many return
statements within this method. Open
Open
return false
Avoid too many return
statements within this method. Open
Open
return unless decrypted.pack('C*').downcase == 'function start-negotiate'
Avoid too many return
statements within this method. Open
Open
return Exploit::CheckCode::Safe("#{peer} - Unexpected response, unable to determine version") if json_body['version'].nil?
Avoid too many return
statements within this method. Open
Open
return Exploit::CheckCode::Safe("#{peer} - Unexpected response, unable to determine version")
Avoid too many return
statements within this method. Open
Open
return nil if potential_targets.empty?
Avoid too many return
statements within this method. Open
Open
return Rex::Version.new(@glinet['firmware']) >= Rex::Version.new('4.0.0') && Rex::Version.new(@glinet['firmware']) <= Rex::Version.new('4.4.3')
Avoid too many return
statements within this method. Open
Open
return CheckCode::Safe
Avoid too many return
statements within this method. Open
Open
return xml_doc_or_check_code unless success # in this case xml_doc_or_check_code is a CheckCode so we can return it directly
Avoid too many return
statements within this method. Open
Open
return [false, 'Failed to parse the users.xml file while attempting to deescalate privileges. Manual cleanup is required.']
Avoid too many return
statements within this method. Open
Open
return CheckCode::Appears("User #{username} has the required privileges for exploitation to work without privilege escalation.")
Avoid too many return
statements within this method. Open
Open
return CheckCode::Safe
Avoid too many return
statements within this method. Open
Open
return [true]
Avoid too many return
statements within this method. Open
Open
return [false, xml_doc_or_msg] unless success # this is only used for cleanup. for exploit this cannot happen
Avoid too many return
statements within this method. Open
Open
return [true, "Successfully deescalated privileges by removing #{@role_to_add}"]
Avoid too many return
statements within this method. Open
Open
return [false, 'Failed to deescalate privileges. Manual cleanup is required.']
Avoid too many return
statements within this method. Open
Open
return deal_with_failure_by_mode(mode, "Failed to parse the users.xml file while attempting to #{deescalate ? 'deescalate' : 'escalate'} privileges: #{e}", 'unexpected_reply')
Avoid too many return
statements within this method. Open
Open
return CheckCode::Detected("Exploitation requires privilege escalation, which is not possible for OpenNMS version #{version}.")
Avoid too many return
statements within this method. Open
Open
return deal_with_failure_by_mode(mode, message, 'unexpected_reply')
Avoid too many return
statements within this method. Open
Open
return CheckCode::Appears("User #{username} has #{@highest_priv} privileges. Exploitation is likely possible via privilege escalation to ROLE_FILESYSTEM_EDITOR.")