metasploit-framework/lib/rex/ui/text
sinn3r d45cdd61aa Resolve #4507 - respond_to? + send = evil
Since Ruby 2.1, the respond_to? method is more strict because it does
not check protected methods. So when you use send(), clearly you're
ignoring this type of access control. The patch is meant to preserve
this behavior to avoid potential breakage.

Resolve #4507
2015-01-02 13:29:17 -06:00
..
input Fix prompt coloring on Windows 2014-12-08 14:31:00 -06:00
output Alias Rex::Ui::Text::Output::Tee print_raw to write, fixes #4469 and #4363 2014-12-29 16:47:04 -08:00
color.rb Retab lib 2013-08-30 16:28:33 -05:00
dispatcher_shell.rb Resolve #4507 - respond_to? + send = evil 2015-01-02 13:29:17 -06:00
input.rb Retab lib 2013-08-30 16:28:33 -05:00
irb_shell.rb Retab lib 2013-08-30 16:28:33 -05:00
output.rb Retab lib 2013-08-30 16:28:33 -05:00
progress_tracker.rb Retab lib 2013-08-30 16:28:33 -05:00
shell.rb Retab lib 2013-08-30 16:28:33 -05:00
table.rb Revert "Various merge resolutions from master <- staging" 2014-08-22 10:17:44 -05:00