Skip to content

Commit e9f7873

Browse files
committed
Version cleanup
Remove all values that are neither 0 nor $Revision$.
1 parent 04a6021 commit e9f7873

31 files changed

+30
-32
lines changed

modules/auxiliary/gather/d20pass.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ def initialize(info = {})
3131
},
3232
'Author' => [ 'K. Reid Wightman <wightman[at]digitalbond.com>' ],
3333
'License' => MSF_LICENSE,
34-
'Version' => '$Revision: 1 $',
34+
'Version' => '$Revision$',
3535
'DisclosureDate' => 'Jan 19 2012'
3636
))
3737

modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313
def initialize
1414
super(
1515
'Name' => 'IPv6 Link Local/Node Local Ping Discovery',
16-
'Version' => '$Revision: 13962 $',
16+
'Version' => '$Revision$',
1717
'Description' => %q{
1818
Send a ICMPv6 ping request to all default multicast addresses, and wait to see who responds.
1919
},

modules/auxiliary/scanner/h323/h323_version.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
1616
def initialize
1717
super(
1818
'Name' => 'H.323 Version Scanner',
19-
'Version' => '$Revision: 9804 $',
19+
'Version' => '$Revision$',
2020
'Description' => 'Detect H.323 Version.',
2121
'Author' => 'hdm',
2222
'License' => MSF_LICENSE

modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit4 < Msf::Auxiliary
1616
def initialize
1717
super(
1818
'Name' => 'Atlassian Crowd XML Entity Expansion Remote File Access',
19-
'Version' => '$Revision: $',
19+
'Version' => '$Revision$',
2020
'Description' => %q{
2121
This module simply attempts to read a remote file from the server using a
2222
vulnerability in the way Atlassian Crowd handles XML files. The vulnerability

modules/auxiliary/server/capture/drda.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ class Constants
3838
def initialize
3939
super(
4040
'Name' => 'Authentication Capture: DRDA (DB2, Informix, Derby)',
41-
'Version' => '$Revision: 14774 $',
41+
'Version' => '$Revision$',
4242
'Description' => %q{
4343
This module provides a fake DRDA (DB2, Informix, Derby) server
4444
that is designed to capture authentication credentials.

modules/auxiliary/server/http_ntlmrelay.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ class Metasploit3 < Msf::Auxiliary
3535
def initialize(info = {})
3636
super(update_info(info,
3737
'Name' => 'HTTP Client MS Credential Relayer',
38-
'Version' => '$Revision:$',
38+
'Version' => '$Revision$',
3939
'Description' => %q{
4040
This module relays negotiated NTLM Credentials from an HTTP server to multiple
4141
protocols. Currently, this module supports relaying to SMB and HTTP.
@@ -52,7 +52,6 @@ def initialize(info = {})
5252
[
5353
'Rich Lundeen <richard.lundeen[at]gmail.com>',
5454
],
55-
'Version' => '$Revision:$',
5655
'License' => MSF_LICENSE,
5756
'Actions' =>
5857
[

modules/auxiliary/vsploit/pii/web_pii.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ def initialize(info = {})
2525
'Description' => 'This module emulates a webserver leaking PII data',
2626
'License' => MSF_LICENSE,
2727
'Author' => 'MJC',
28-
'Version' => '$Revision: $',
28+
'Version' => '$Revision$',
2929
'References' =>
3030
[
3131
[ 'URL', 'http://www.metasploit.com'],

modules/encoders/x86/context_cpuid.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback
2222
def initialize
2323
super(
2424
'Name' => 'CPUID-based Context Keyed Payload Encoder',
25-
'Version' => '$Revision: 1$',
25+
'Version' => '$Revision$',
2626
'Description' => %q{
2727
This is a Context-Keyed Payload Encoder based on CPUID and Shikata Ga Nai.
2828
},

modules/exploits/linux/http/webid_converter.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ def initialize(info = {})
3131
[ 'OSVDB', '73609' ],
3232
[ 'EDB', '17487' ]
3333
],
34-
'Version' => '$Revision: $',
34+
'Version' => '$Revision$',
3535
'Privileged' => false,
3636
'Platform' => ['php'],
3737
'Arch' => ARCH_PHP,

modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ def initialize(info = {})
3333
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
3434
],
3535
'License' => MSF_LICENSE,
36-
'Version' => '$Revision: 3 $',
36+
'Version' => '$Revision$',
3737
'Privileged' => false,
3838
'Arch' => ARCH_CMD,
3939
'Platform' => 'unix',

0 commit comments

Comments
 (0)