fix msftidy errors

GSoC/Meterpreter_Web_Console
Christian Mehlmauer 2018-08-28 13:12:43 +02:00
parent 1381e1f3e0
commit a66556b436
No known key found for this signature in database
GPG Key ID: DCF54A05D6E62591
5 changed files with 5 additions and 5 deletions

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Auxiliary
'References' => 'References' =>
[ [
[ 'CVE' '2015-5374' ], [ 'CVE' '2015-5374' ],
[ 'URL', 'https://www.exploit-db.com/exploits/44103/' ], [ 'EDB', '44103' ],
[ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01' ] [ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01' ]
]) ])
register_options([Opt::RPORT(50000),]) register_options([Opt::RPORT(50000),])

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
[ [
[ 'EDB', '40889'], [ 'EDB', '40889'],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=305'], [ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=305'],
[ 'URL', 'https://www.kb.cert.org/vuls/id/582384'], [ 'US-CERT-VU', '582384'],
[ 'URL', 'http://kb.netgear.com/000036386/CVE-2016-582384'], [ 'URL', 'http://kb.netgear.com/000036386/CVE-2016-582384'],
[ 'CVE', '2016-6277'] [ 'CVE', '2016-6277']
], ],

View File

@ -38,7 +38,7 @@ class MetasploitModule < Msf::Exploit::Remote
['CVE', '2017-5816'], ['CVE', '2017-5816'],
['EDB', '43198'], ['EDB', '43198'],
['ZDI', '17-340'], ['ZDI', '17-340'],
['URL', 'https://www.securityfocus.com/bid/98469/info'], ['BID', '98469'],
['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us'] ['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us']
], ],
'Platform' => 'win', 'Platform' => 'win',

View File

@ -38,7 +38,7 @@ class MetasploitModule < Msf::Exploit::Remote
['CVE', '2017-5817'], ['CVE', '2017-5817'],
['EDB', '43195'], ['EDB', '43195'],
['ZDI', '17-341'], ['ZDI', '17-341'],
['URL', 'https://www.securityfocus.com/bid/98469/info'], ['BID', '98469'],
['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us'] ['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us']
], ],
'Platform' => 'win', 'Platform' => 'win',

View File

@ -745,7 +745,7 @@ if __FILE__ == $PROGRAM_NAME
Find.find(dir) do |full_filepath| Find.find(dir) do |full_filepath|
next if full_filepath =~ /\.git[\x5c\x2f]/ next if full_filepath =~ /\.git[\x5c\x2f]/
next unless File.file? full_filepath next unless File.file? full_filepath
next unless full_filepath =~ /\.rb$/ next unless File.extname(full_filepath) == '.rb'
# Executable files are now assumed to be external modules # Executable files are now assumed to be external modules
next if File.executable?(full_filepath) next if File.executable?(full_filepath)
msftidy = Msftidy.new(full_filepath) msftidy = Msftidy.new(full_filepath)