metasploit-framework/modules/exploits/linux
sinn3r d45cdd61aa Resolve #4507 - respond_to? + send = evil
Since Ruby 2.1, the respond_to? method is more strict because it does
not check protected methods. So when you use send(), clearly you're
ignoring this type of access control. The patch is meant to preserve
this behavior to avoid potential breakage.

Resolve #4507
2015-01-02 13:29:17 -06:00
..
antivirus Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
browser Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
ftp Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
games Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
http Land #4372 2014-12-11 18:48:16 -08:00
ids Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
imap Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
local Minor grammar fixes on modules 2014-12-31 11:45:14 -06:00
misc Resolve #4507 - respond_to? + send = evil 2015-01-02 13:29:17 -06:00
mysql Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
pop3 Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
postgres Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
pptp Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
proxy Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
samba Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
smtp Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
ssh Differentiate failed binds from connects, closes #4169 2014-11-11 14:59:41 -06:00
telnet Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
upnp Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00