rapid7/metasploit-framework

View on GitHub
modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb

Summary

Maintainability
A
3 hrs
Test Coverage

Method initialize has 52 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info={})
    super(update_info(info,
      'Name'           => "Dell SonicWALL Scrutinizer 11.01 methodDetail SQL Injection",
      'Description'    => %q{
        This module exploits a vulnerability found in Dell SonicWALL Scrutinizer. The methodDetail

    Method upload_payload has 27 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def upload_payload(backdoor_fname, payload_fname)
        p = generate_payload_exe(
          code: payload.encoded,
          platform: @my_target.platform,
          arch: @my_target.arch

      There are no issues that match your filters.

      Category
      Status