metasploit-framework/modules/post
sinn3r d45cdd61aa Resolve #4507 - respond_to? + send = evil
Since Ruby 2.1, the respond_to? method is more strict because it does
not check protected methods. So when you use send(), clearly you're
ignoring this type of access control. The patch is meant to preserve
this behavior to avoid potential breakage.

Resolve #4507
2015-01-02 13:29:17 -06:00
..
aix Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
cisco/gather Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
firefox Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
linux Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
multi fix msftidy warnings 2014-12-12 13:16:21 +01:00
osx Resolve #4507 - respond_to? + send = evil 2015-01-02 13:29:17 -06:00
solaris/gather Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
windows Minor grammar fixes on modules 2014-12-31 11:45:14 -06:00