Skip to content

Commit 33ce74f

Browse files
committed
Merge branch 'msftidy-1' of git://github.com/schierlm/metasploit-framework into schierlm-msftidy-1
2 parents 1ce3655 + 5b18a34 commit 33ce74f

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+48
-57
lines changed

modules/auxiliary/admin/ftp/titanftp_xcrc_traversal.rb

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,13 +35,11 @@ def initialize
3535
'Author' => 'jduck',
3636
'License' => MSF_LICENSE,
3737
'Version' => '$Revision$',
38-
'Platform' => [ 'win' ],
3938
'References' =>
4039
[
4140
[ 'OSVDB', '65533'],
4241
[ 'URL', 'http://seclists.org/bugtraq/2010/Jun/160' ]
4342
],
44-
'Privileged' => true,
4543
'DisclosureDate' => 'Jun 15 2010'
4644
)
4745

modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ def initialize(info = {})
2626
},
2727
'Author' => [ 'nullbind <scott.sutherland[at]netspi.com>' ],
2828
'License' => MSF_LICENSE,
29-
'Platform' => [ 'win' ],
3029
'References' => [[ 'URL', 'http://en.wikipedia.org/wiki/SMBRelay' ]]
3130
))
3231

modules/auxiliary/admin/mssql/mssql_ntlm_stealer_sqli.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,6 @@ def initialize(info = {})
3333
[ 'Automatic', { } ],
3434
],
3535
'DefaultTarget' => 0,
36-
'Platform' => [ 'win' ],
3736
'References' => [[ 'URL', 'http://en.wikipedia.org/wiki/SMBRelay' ]]
3837
))
3938

modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,6 @@ def initialize
4545
['URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000898.1-1']
4646
],
4747
# Tested OK against sol8.tor 20100624 -jjd
48-
'Privileged' => true,
4948
'DisclosureDate' => 'Jan 22 2003')
5049

5150
register_options(

modules/auxiliary/dos/pptp/ms02_063_pptp_dos.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@ def initialize(info = {})
2727
Code execution may be possible however this module is only a DoS.
2828
},
2929
'Author' => [ 'patrick' ],
30-
'Arch' => [ ARCH_X86 ],
3130
'License' => MSF_LICENSE,
3231
'Version' => '$Revision$',
3332
'References' =>

modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,6 @@ def initialize(info = {})
4343
[ 'EDB', 15803 ],
4444
[ 'URL', 'http://blogs.technet.com/b/srd/archive/2010/12/22/assessing-an-iis-ftp-7-5-unauthenticated-denial-of-service-vulnerability.aspx' ]
4545
],
46-
'Platform' => [ 'win' ],
4746
'DisclosureDate' => 'Dec 21 2010'))
4847

4948
register_options(

modules/auxiliary/gather/d20pass.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ def initialize(info = {})
3131
},
3232
'Author' => [ 'K. Reid Wightman <wightman[at]digitalbond.com>' ],
3333
'License' => MSF_LICENSE,
34-
'Version' => '$Revision: 1 $',
34+
'Version' => '$Revision$',
3535
'DisclosureDate' => 'Jan 19 2012'
3636
))
3737

modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313
def initialize
1414
super(
1515
'Name' => 'IPv6 Link Local/Node Local Ping Discovery',
16-
'Version' => '$Revision: 13962 $',
16+
'Version' => '$Revision$',
1717
'Description' => %q{
1818
Send a ICMPv6 ping request to all default multicast addresses, and wait to see who responds.
1919
},

modules/auxiliary/scanner/h323/h323_version.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
1616
def initialize
1717
super(
1818
'Name' => 'H.323 Version Scanner',
19-
'Version' => '$Revision: 9804 $',
19+
'Version' => '$Revision$',
2020
'Description' => 'Detect H.323 Version.',
2121
'Author' => 'hdm',
2222
'License' => MSF_LICENSE

modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit4 < Msf::Auxiliary
1616
def initialize
1717
super(
1818
'Name' => 'Atlassian Crowd XML Entity Expansion Remote File Access',
19-
'Version' => '$Revision: $',
19+
'Version' => '$Revision$',
2020
'Description' => %q{
2121
This module simply attempts to read a remote file from the server using a
2222
vulnerability in the way Atlassian Crowd handles XML files. The vulnerability

0 commit comments

Comments
 (0)