msftidy: remove $Revision$

bug/bundler_fix
Christian Mehlmauer 2013-01-03 01:05:45 +01:00
parent 4d8a2a0885
commit e4a6669927
27 changed files with 24 additions and 51 deletions

View File

@ -30,8 +30,7 @@ class Metasploit3 < Msf::Auxiliary
['BID', '37670'],
['OSVDB', '61538'],
['URL','http://praetorianprefect.com/archives/2010/01/junos-juniper-flaw-exposes-core-routers-to-kernal-crash/']
],
'Version' => '$Revision$' # 02/02/2010
]
)
register_options([

View File

@ -17,8 +17,7 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'TCP SYN Flooder',
'Description' => 'A simple TCP SYN flooder',
'Author' => 'kris katterjohn',
'License' => MSF_LICENSE,
'Version' => '$Revision$' # 03/13/2009
'License' => MSF_LICENSE
)
register_options([

View File

@ -19,8 +19,7 @@ class Metasploit3 < Msf::Auxiliary
valid email addresses for the target domain.
},
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$'))
'License' => MSF_LICENSE))
register_options(
[

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
of a specific file in a given path.
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -27,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary
in GET/POST Query parameters values.
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
of a specific file in a given path.
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -24,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary
in a given directory path.
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
in a given directory path.
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -36,8 +36,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2009-1122' ],
[ 'OSVDB', '54555' ],
[ 'BID', '34993' ],
],
'Version' => '$Revision$'))
]))
register_options(
[

View File

@ -24,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -27,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary
Only works if PATH is differenet than '/'.
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -24,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary
in a given directory path.
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -26,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary
XSS attack to redirect user browser to a attacker controller website.
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -26,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary
files found will be displayed.
},
'Author' => [ 'diablohorn [at] gmail.com' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$'))
'License' => MSF_LICENSE))
register_options(
[

View File

@ -20,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary
If the webserver has mod_negotiation enabled, the IP address will be displayed.
},
'Author' => [ 'diablohorn [at] gmail.com' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$'))
'License' => MSF_LICENSE))
register_options(
[

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
following files /backup/files.ext .
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -27,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -24,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary
hidden methods.
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$'))
'License' => MSF_LICENSE))
register_options(
[

View File

@ -27,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -32,8 +32,7 @@ require 'cgi'
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
This module identifies common vulnerable files or cgis.
},
'Author' => [ 'et' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
This module exploits blind XPATH 1.0 injections over HTTP GET requests.
},
'Author' => [ 'et [at] metasploit . com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$'))
'License' => BSD_LICENSE))
register_options(
[

View File

@ -22,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
not in place for them.
},
'Author' => 'kris katterjohn',
'Version' => '$Revision$', # 03/26/2009
'License' => MSF_LICENSE
)

View File

@ -20,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary
Enumerate open TCP services using a raw SYN scan.
},
'Author' => 'kris katterjohn',
'Version' => '$Revision$', # 03/26/2009
'License' => MSF_LICENSE
)

View File

@ -22,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
PSH and URG flags.
},
'Author' => 'kris katterjohn',
'Version' => '$Revision$', # 04/08/2009
'License' => MSF_LICENSE
)

View File

@ -26,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'URL', 'http://www.postgresql.org' ]
],
'Version' => '$Revision$' # 2009-02-05
]
))
register_options([ ], self.class) # None needed.