rapid7/metasploit-framework

View on GitHub

Showing 16,065 of 22,177 total issues

Avoid too many return statements within this method.
Open

    return true if Rex::Socket::RangeWalker.new("255.255.255.255-255.255.255.255").include? ip_x
Severity: Major
Found in lib/msf/core/db_manager/ip_address.rb - About 30 mins to fix

    Avoid too many return statements within this method.
    Open

        return :error
    Severity: Major
    Found in lib/msf/core/exploit/remote/vim_soap.rb - About 30 mins to fix

      Avoid too many return statements within this method.
      Open

            return result
      Severity: Major
      Found in lib/msf/core/exploit/oracle.rb - About 30 mins to fix

        Avoid too many return statements within this method.
        Open

              return Hash.from_xml(res.body)['Envelope']['Body']
        Severity: Major
        Found in lib/msf/core/exploit/remote/vim_soap.rb - About 30 mins to fix

          Avoid too many return statements within this method.
          Open

                        return nil
          Severity: Major
          Found in lib/msf/core/exploit/remote/http/exchange.rb - About 30 mins to fix

            Avoid too many return statements within this method.
            Open

                          return Rex::Version.new(Regexp.last_match('build'))
            Severity: Major
            Found in lib/msf/core/exploit/remote/http/exchange.rb - About 30 mins to fix

              Avoid too many return statements within this method.
              Open

                    return [1, ['Connection failed']]
              Severity: Major
              Found in lib/msf/core/exploit/remote/http/nagios_xi/login.rb - About 30 mins to fix

                Avoid too many return statements within this method.
                Open

                    return 6, 'Failed to extract nsp string' if handle_nsp && !nsp.present?
                Severity: Major
                Found in lib/msf/core/exploit/remote/http/nagios_xi/login.rb - About 30 mins to fix

                  Avoid too many return statements within this method.
                  Open

                      return version if version
                  Severity: Major
                  Found in lib/msf/core/exploit/remote/http/wordpress/version.rb - About 30 mins to fix

                    Avoid too many return statements within this method.
                    Open

                                    return Rex::Version.new(version)
                    Severity: Major
                    Found in lib/msf/core/exploit/remote/http/exchange.rb - About 30 mins to fix

                      Avoid too many return statements within this method.
                      Open

                            return $1
                      Severity: Major
                      Found in lib/msf/core/exploit/remote/http/wordpress/users.rb - About 30 mins to fix

                        Avoid too many return statements within this method.
                        Open

                                        return nil
                        Severity: Major
                        Found in lib/msf/core/exploit/remote/http/exchange.rb - About 30 mins to fix

                          Avoid too many return statements within this method.
                          Open

                              return version if version
                          Severity: Major
                          Found in lib/msf/core/exploit/remote/http/wordpress/version.rb - About 30 mins to fix

                            Avoid too many return statements within this method.
                            Open

                                  return [5, [auth_cookies, nsp]]
                            Severity: Major
                            Found in lib/msf/core/exploit/remote/http/nagios_xi/login.rb - About 30 mins to fix

                              Avoid too many return statements within this method.
                              Open

                                            return Rex::Version.new(Regexp.last_match('build'))
                              Severity: Major
                              Found in lib/msf/core/exploit/remote/http/exchange.rb - About 30 mins to fix

                                Avoid too many return statements within this method.
                                Open

                                    return version if version
                                Severity: Major
                                Found in lib/msf/core/exploit/remote/http/wordpress/version.rb - About 30 mins to fix

                                  Avoid too many return statements within this method.
                                  Open

                                      return blog_posts
                                  Severity: Major
                                  Found in lib/msf/core/exploit/remote/http/wordpress/posts.rb - About 30 mins to fix

                                    Avoid too many return statements within this method.
                                    Open

                                          return [1, 'Connection failed']
                                    Severity: Major
                                    Found in lib/msf/core/exploit/remote/http/nagios_xi/install.rb - About 30 mins to fix

                                      Avoid too many return statements within this method.
                                      Open

                                          return Msf::Exploit::CheckCode::Detected(e.message)
                                      Severity: Major
                                      Found in lib/msf/core/exploit/remote/http/wordpress/version.rb - About 30 mins to fix

                                        Avoid too many return statements within this method.
                                        Open

                                              return 7, 'Unable to obtain the Nagios XI version from the dashboard'
                                        Severity: Major
                                        Found in lib/msf/core/exploit/remote/http/nagios_xi/login.rb - About 30 mins to fix
                                          Severity
                                          Category
                                          Status
                                          Source
                                          Language