Do unless instead "if !" to follow the Ruby guideline
parent
b5284375a7
commit
99a573a013
|
@ -133,7 +133,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def exploit
|
||||
if !datastore['CMD'].blank?
|
||||
unless datastore['CMD'].blank?
|
||||
print_status("Executing user supplied command")
|
||||
execute_command(datastore['CMD'])
|
||||
return
|
||||
|
|
|
@ -186,7 +186,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def exploit
|
||||
if !datastore['CMD'].blank?
|
||||
unless datastore['CMD'].blank?
|
||||
print_status("Executing user supplied command")
|
||||
execute_command(datastore['CMD'])
|
||||
return
|
||||
|
|
|
@ -149,7 +149,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
def exploit
|
||||
|
||||
if !datastore['CMD'].blank?
|
||||
unless datastore['CMD'].blank?
|
||||
print_status("Executing command '#{datastore['CMD']}'")
|
||||
execute_command(datastore['CMD'])
|
||||
return
|
||||
|
|
|
@ -92,7 +92,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
def exploit
|
||||
if !datastore['CMD'].blank?
|
||||
unless datastore['CMD'].blank?
|
||||
print_status("Executing command '#{datastore['CMD']}'")
|
||||
execute_command(datastore['CMD'])
|
||||
return
|
||||
|
|
|
@ -110,7 +110,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
def exploit
|
||||
|
||||
if !datastore['CMD'].blank?
|
||||
unless datastore['CMD'].blank?
|
||||
print_status("Executing command '#{datastore['CMD']}'")
|
||||
execute_command(datastore['CMD'])
|
||||
return
|
||||
|
|
|
@ -93,7 +93,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
def exploit
|
||||
|
||||
if !datastore['CMD'].blank?
|
||||
unless datastore['CMD'].blank?
|
||||
print_status("Executing command '#{datastore['CMD']}'")
|
||||
execute_command(datastore['CMD'])
|
||||
return
|
||||
|
|
Loading…
Reference in New Issue