metasploit-framework/lib/msf/core/post
sinn3r d45cdd61aa Resolve #4507 - respond_to? + send = evil
Since Ruby 2.1, the respond_to? method is more strict because it does
not check protected methods. So when you use send(), clearly you're
ignoring this type of access control. The patch is meant to preserve
this behavior to avoid potential breakage.

Resolve #4507
2015-01-02 13:29:17 -06:00
..
linux Retab lib 2013-08-30 16:28:33 -05:00
osx Resolve #4507 - respond_to? + send = evil 2015-01-02 13:29:17 -06:00
solaris Retab lib 2013-08-30 16:28:33 -05:00
windows Fix legacy railgun LDAP implementation 2014-12-13 18:26:26 +00:00
common.rb Fix #3886 - Backtrace for #check when session is invalid 2014-12-02 17:22:46 -06:00
file.rb Do not delete files that do not exist in rm_f 2014-12-17 09:18:06 -05:00
linux.rb Add 'coding: binary' to all msf/rex library files 2014-08-17 17:31:53 -05:00
osx.rb Add 'coding: binary' to all msf/rex library files 2014-08-17 17:31:53 -05:00
solaris.rb Add 'coding: binary' to all msf/rex library files 2014-08-17 17:31:53 -05:00
unix.rb Merge for retab 2013-09-05 13:41:23 -05:00
webrtc.rb Clean up some dead code. 2014-06-06 16:20:40 -05:00
windows.rb Add 'coding: binary' to all msf/rex library files 2014-08-17 17:31:53 -05:00