mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
fix msftidy errors
This commit is contained in:
parent
1381e1f3e0
commit
a66556b436
@ -21,7 +21,7 @@ class MetasploitModule < Msf::Auxiliary
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE' '2015-5374' ],
|
||||
[ 'URL', 'https://www.exploit-db.com/exploits/44103/' ],
|
||||
[ 'EDB', '44103' ],
|
||||
[ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01' ]
|
||||
])
|
||||
register_options([Opt::RPORT(50000),])
|
||||
|
@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
[
|
||||
[ 'EDB', '40889'],
|
||||
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=305'],
|
||||
[ 'URL', 'https://www.kb.cert.org/vuls/id/582384'],
|
||||
[ 'US-CERT-VU', '582384'],
|
||||
[ 'URL', 'http://kb.netgear.com/000036386/CVE-2016-582384'],
|
||||
[ 'CVE', '2016-6277']
|
||||
],
|
||||
|
@ -38,7 +38,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
['CVE', '2017-5816'],
|
||||
['EDB', '43198'],
|
||||
['ZDI', '17-340'],
|
||||
['URL', 'https://www.securityfocus.com/bid/98469/info'],
|
||||
['BID', '98469'],
|
||||
['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us']
|
||||
],
|
||||
'Platform' => 'win',
|
||||
|
@ -38,7 +38,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
['CVE', '2017-5817'],
|
||||
['EDB', '43195'],
|
||||
['ZDI', '17-341'],
|
||||
['URL', 'https://www.securityfocus.com/bid/98469/info'],
|
||||
['BID', '98469'],
|
||||
['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us']
|
||||
],
|
||||
'Platform' => 'win',
|
||||
|
@ -745,7 +745,7 @@ if __FILE__ == $PROGRAM_NAME
|
||||
Find.find(dir) do |full_filepath|
|
||||
next if full_filepath =~ /\.git[\x5c\x2f]/
|
||||
next unless File.file? full_filepath
|
||||
next unless full_filepath =~ /\.rb$/
|
||||
next unless File.extname(full_filepath) == '.rb'
|
||||
# Executable files are now assumed to be external modules
|
||||
next if File.executable?(full_filepath)
|
||||
msftidy = Msftidy.new(full_filepath)
|
||||
|
Loading…
Reference in New Issue
Block a user