rapid7/metasploit-framework

View on GitHub
modules/auxiliary/admin/backupexec/registry.rb

Summary

Maintainability
A
2 hrs
Test Coverage

Method initialize has 34 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Veritas Backup Exec Server Registry Access',
      'Description'    => %q{
        This modules exploits a remote registry access flaw in the BackupExec Windows
Severity: Minor
Found in modules/auxiliary/admin/backupexec/registry.rb - About 1 hr to fix

    Method backupexec_regwrite has 5 arguments (exceeds 4 allowed). Consider refactoring.
    Open

      def backupexec_regwrite(hive, subkey, subval, type, data)
    Severity: Minor
    Found in modules/auxiliary/admin/backupexec/registry.rb - About 35 mins to fix

      There are no issues that match your filters.

      Category
      Status