Rm empty references

bug/bundler_fix
wchen-r7 2016-04-24 11:46:08 -05:00
parent 2edd6869fc
commit 4a95e675ae
12 changed files with 1 additions and 38 deletions

View File

@ -26,10 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'Author' => [ 'hdm' ], 'Author' => [ 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' =>
[
],
'Actions' => 'Actions' =>
[ [
['Attack'], ['Attack'],

View File

@ -18,10 +18,7 @@ class MetasploitModule < Msf::Auxiliary
}, },
'Author' => [ 'hdm' ], 'Author' => [ 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE
'References' =>
[
]
)) ))
register_options([Opt::RPORT(445)], self.class) register_options([Opt::RPORT(445)], self.class)

View File

@ -29,9 +29,6 @@ class MetasploitModule < Msf::Auxiliary
'sinn3r', 'sinn3r',
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' =>
[
],
'Actions' => 'Actions' =>
[ [
['PUT'], ['PUT'],

View File

@ -21,9 +21,6 @@ class MetasploitModule < Msf::Auxiliary
vulnerable machine. Please note that the SSL option is required in order to send vulnerable machine. Please note that the SSL option is required in order to send
HTTP requests. HTTP requests.
}, },
'References' =>
[
],
'Author' => 'Author' =>
[ [
'rgod', #Discovery 'rgod', #Discovery

View File

@ -24,9 +24,6 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'hdm' 'hdm'
], ],
'References' =>
[
],
'DefaultOptions' => 'DefaultOptions' =>
{ {
'EXITFUNC' => 'thread' 'EXITFUNC' => 'thread'

View File

@ -35,9 +35,6 @@ class MetasploitModule < Msf::Exploit::Remote
}, },
'Platform' => ['linux'], 'Platform' => ['linux'],
'Arch' => ARCH_X86, 'Arch' => ARCH_X86,
'References' =>
[
],
'Targets' => 'Targets' =>
[ [
[ 'HP System Management 7.1.1 - Linux (CentOS)', [ 'HP System Management 7.1.1 - Linux (CentOS)',

View File

@ -30,9 +30,6 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit 'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
], ],
'References' =>
[
],
'Payload' => 'Payload' =>
{ {
'Space' => 1024, 'Space' => 1024,

View File

@ -36,9 +36,6 @@ class MetasploitModule < Msf::Exploit::Local
'Space' => 227, 'Space' => 227,
'BadChars' => "\x00\x22" 'BadChars' => "\x00\x22"
}, },
'References' =>
[
],
'Targets' => 'Targets' =>
[ [
[ 'HP System Management Homepage 7.1.1', [ 'HP System Management Homepage 7.1.1',

View File

@ -37,9 +37,6 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
'egypt', # stolen from mpack 'egypt', # stolen from mpack
], ],
'References' =>
[
],
'Payload' => 'Payload' =>
{ {
'EXITFUNC' => 'process', 'EXITFUNC' => 'process',

View File

@ -21,9 +21,6 @@ class MetasploitModule < Msf::Exploit::Remote
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'References' =>
[
],
'DefaultOptions' => 'DefaultOptions' =>
{ {
'EXITFUNC' => 'process', 'EXITFUNC' => 'process',

View File

@ -20,9 +20,6 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ '<valsmith[at]metasploit.com>', '<chamuco[at]gmail.com>', 'patrick' ], 'Author' => [ '<valsmith[at]metasploit.com>', '<chamuco[at]gmail.com>', 'patrick' ],
'Arch' => [ ARCH_X86 ], 'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' =>
[
],
'DefaultOptions' => 'DefaultOptions' =>
{ {
'EXITFUNC' => 'thread', 'EXITFUNC' => 'thread',

View File

@ -21,9 +21,6 @@ class MetasploitModule < Msf::Exploit::Remote
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' =>
[
],
'Privileged' => true, 'Privileged' => true,
'DefaultOptions' => 'DefaultOptions' =>
{ {