Unpolluting SVN Revision keyword
Sometimes Revision keywords get expanded, too. Fix those.unstable
parent
3626d48db2
commit
302853f5a4
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'ContentKeeper Web Appliance mimencode File Access',
|
||||
'Version' => '$Revision: 14288 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
This module abuses the 'mimencode' binary present within
|
||||
ContentKeeper Web filtering appliances to retrieve arbitrary
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Tomcat Administration Tool Default Access',
|
||||
'Version' => '$Revision: 13394 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect the Tomcat administration interface.',
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
|
||||
'Version' => '$Revision: 14288 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
This module tests whether a directory traversal vulnerablity is present
|
||||
in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
|
||||
'Version' => '$Revision: 14288 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
This module tests whether a directory traversal vulnerablity is present
|
||||
in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294.
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] cyberspace.org' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 13183 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] cyberspace.org' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 14735 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 11796 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP SSL Certificate Checker',
|
||||
'Version' => '$Revision: 11796 $',
|
||||
'Version' => '$Revision$',
|
||||
'Author' => 'nebulus',
|
||||
'License' => MSF_LICENSE,
|
||||
'Description' => %q{
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability',
|
||||
'Version' => '$Revision: 14532 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
This module tests whether a directory traversal vulnerablity is present
|
||||
in versions of Cisco Network Access Manager 4.8.x You may wish to change
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] cyberspace.org' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 11796 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 13183 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 11796 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -41,7 +41,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'OSVDB', '54555' ],
|
||||
[ 'BID', '34993' ],
|
||||
],
|
||||
'Version' => '$Revision: 14034 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] cyberspace.org' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 11796 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 13183 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 14288 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'FrontPage Server Extensions Login Utility',
|
||||
'Version' => '$Revision: 12623 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'This module queries the FrontPage Server Extensions and determines whether anonymous access is allowed.',
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP Version Detection',
|
||||
'Version' => '$Revision: 14597 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Display version information about each system',
|
||||
'Author' => 'hdm',
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 10394 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
requires either Basic, Digest or NTLM authentication.
|
||||
},
|
||||
'Author' => [ 'et', 'patrick' ],
|
||||
'Version' => '$Revision: 14034 $',
|
||||
'Version' => '$Revision$',
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'HTTP Open Proxy Detection',
|
||||
'Version' => '$Revision: 14316 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
Checks if an HTTP proxy is open. False positive are avoided
|
||||
verifing the HTTP return code and matching a pattern.
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP Options Detection',
|
||||
'Version' => '$Revision: 12623 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Display available HTTP options for each system',
|
||||
'Author' => ['CG'],
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 13183 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] cyberspace.org' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 11796 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP Robots.txt Content Scanner',
|
||||
'Version' => '$Revision: 13183 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect robots.txt files and analize its content',
|
||||
'Author' => ['et'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'patrick' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: 14560 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'Bernardo Damele A. G. <bernardo.damele[at]gmail.com>' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 14252 $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://sqlmap.sourceforge.net'],
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP SSL Certificate Information',
|
||||
'Version' => '$Revision: 14319 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Parse the server SSL certificate to obtain the common name and signature algorithm',
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP Subversion Scanner',
|
||||
'Version' => '$Revision: 11796 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect subversion directories and files and analize its content. Only SVN Version > 7 supported',
|
||||
'Author' => ['et'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP TRACE Detection',
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Test if TRACE is actually enabled. 405 (Apache) 501(IIS) if its disabled, 200 if it is',
|
||||
'Author' => ['CG'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP trace.axd Content Scanner',
|
||||
'Version' => '$Revision: 11796 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect trace.axd files and analize its content',
|
||||
'Author' => ['c4an'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 11796 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -37,7 +37,7 @@ require 'cgi'
|
|||
},
|
||||
'Author' => [ 'et [at] cyberspace.org' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 13183 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 11796 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP WebDAV Internal IP Scanner',
|
||||
'Version' => '$Revision: 14137 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect webservers internal IPs though WebDAV',
|
||||
'Author' => ['et'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP WebDAV Scanner',
|
||||
'Version' => '$Revision: 14527 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect webservers with WebDAV enabled',
|
||||
'Author' => ['et'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP WebDAV Website Content Scanner',
|
||||
'Version' => '$Revision: 14067 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect webservers disclosing its content though WebDAV',
|
||||
'Author' => ['et'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit . com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 13983 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue