diff --git a/modules/encoders/cmd/generic_sh.rb b/modules/encoders/cmd/generic_sh.rb index 9fbd09b86f..ab43078de3 100644 --- a/modules/encoders/cmd/generic_sh.rb +++ b/modules/encoders/cmd/generic_sh.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'Generic Shell Variable Substitution Command Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder uses standard Bourne shell variable substitution tricks to avoid commonly restricted characters. diff --git a/modules/encoders/cmd/ifs.rb b/modules/encoders/cmd/ifs.rb index 08d4ba9b6e..758712adec 100644 --- a/modules/encoders/cmd/ifs.rb +++ b/modules/encoders/cmd/ifs.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'Generic ${IFS} Substitution Command Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder uses standard Bourne shell variable substitution to avoid spaces without being overly fancy. diff --git a/modules/encoders/cmd/printf_php_mq.rb b/modules/encoders/cmd/printf_php_mq.rb index b391d595bf..2334278d42 100644 --- a/modules/encoders/cmd/printf_php_mq.rb +++ b/modules/encoders/cmd/printf_php_mq.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'printf(1) via PHP magic_quotes Utility Command Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder uses the printf(1) utility to avoid restricted characters. Some shell variable substituion may also be used diff --git a/modules/encoders/generic/none.rb b/modules/encoders/generic/none.rb index 3558d1c466..c8a0acc3b7 100644 --- a/modules/encoders/generic/none.rb +++ b/modules/encoders/generic/none.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'The "none" Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This "encoder" does not transform the payload in any way. }, diff --git a/modules/encoders/mipsbe/longxor.rb b/modules/encoders/mipsbe/longxor.rb index f0d3712471..6e01f655ba 100644 --- a/modules/encoders/mipsbe/longxor.rb +++ b/modules/encoders/mipsbe/longxor.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'XOR Encoder', - 'Version' => '$Revision$', 'Description' => %q{ Mips Web server exploit friendly xor encoder }, diff --git a/modules/encoders/mipsle/longxor.rb b/modules/encoders/mipsle/longxor.rb index 8f8e60655f..2e7377f6a4 100644 --- a/modules/encoders/mipsle/longxor.rb +++ b/modules/encoders/mipsle/longxor.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'XOR Encoder', - 'Version' => '$Revision$', 'Description' => %q{ Mips Web server exploit friendly xor encoder }, diff --git a/modules/encoders/php/base64.rb b/modules/encoders/php/base64.rb index 60e2190b6d..481dd52ef7 100644 --- a/modules/encoders/php/base64.rb +++ b/modules/encoders/php/base64.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'PHP Base64 Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder returns a base64 string encapsulated in eval(base64_decode()), increasing the size by a bit more than diff --git a/modules/encoders/ppc/longxor.rb b/modules/encoders/ppc/longxor.rb index d5c899f658..42f346b2cf 100644 --- a/modules/encoders/ppc/longxor.rb +++ b/modules/encoders/ppc/longxor.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'PPC LongXOR Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder is ghandi's PPC dword xor encoder with some size tweaks by HDM. diff --git a/modules/encoders/ppc/longxor_tag.rb b/modules/encoders/ppc/longxor_tag.rb index 430cb6bdb6..8f59331223 100644 --- a/modules/encoders/ppc/longxor_tag.rb +++ b/modules/encoders/ppc/longxor_tag.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'PPC LongXOR Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder is ghandi's PPC dword xor encoder but uses a tag-based terminator rather than a length. diff --git a/modules/encoders/sparc/longxor_tag.rb b/modules/encoders/sparc/longxor_tag.rb index e24dd39dc9..f57b3c24ab 100644 --- a/modules/encoders/sparc/longxor_tag.rb +++ b/modules/encoders/sparc/longxor_tag.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback def initialize super( 'Name' => 'SPARC DWORD XOR Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder is optyx's 48-byte SPARC encoder with some tweaks. }, diff --git a/modules/encoders/x64/xor.rb b/modules/encoders/x64/xor.rb index e09dcc5c4b..7903b97075 100644 --- a/modules/encoders/x64/xor.rb +++ b/modules/encoders/x64/xor.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'XOR Encoder', - 'Version' => '$Revision$', 'Description' => 'An x64 XOR encoder. Uses an 8 byte key and takes advantage of x64 relative addressing.', 'Author' => [ 'sf' ], 'Arch' => ARCH_X86_64, diff --git a/modules/encoders/x86/alpha_mixed.rb b/modules/encoders/x86/alpha_mixed.rb index a6d3d0c2e1..50da763ac4 100644 --- a/modules/encoders/x86/alpha_mixed.rb +++ b/modules/encoders/x86/alpha_mixed.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Alphanum def initialize super( 'Name' => "Alpha2 Alphanumeric Mixedcase Encoder", - 'Version' => '$Revision$', 'Description' => %q{ Encodes payloads as alphanumeric mixedcase text. This encoder uses SkyLined's Alpha2 encoding suite. diff --git a/modules/encoders/x86/alpha_upper.rb b/modules/encoders/x86/alpha_upper.rb index ba6556cb0c..96580245d3 100644 --- a/modules/encoders/x86/alpha_upper.rb +++ b/modules/encoders/x86/alpha_upper.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::Alphanum def initialize super( 'Name' => "Alpha2 Alphanumeric Uppercase Encoder", - 'Version' => '$Revision$', 'Description' => %q{ Encodes payloads as alphanumeric uppercase text. This encoder uses SkyLined's Alpha2 encoding suite. diff --git a/modules/encoders/x86/avoid_underscore_tolower.rb b/modules/encoders/x86/avoid_underscore_tolower.rb index 24e3cd0293..83f5e5b15b 100644 --- a/modules/encoders/x86/avoid_underscore_tolower.rb +++ b/modules/encoders/x86/avoid_underscore_tolower.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'Avoid underscore/tolower', - 'Version' => '$Revision$', 'Description' => %q{ Underscore/tolower Safe Encoder used to exploit CVE-2012-2329. It is a modified version of the 'Avoid UTF8/tolower' encoder by skape. Please check diff --git a/modules/encoders/x86/avoid_utf8_tolower.rb b/modules/encoders/x86/avoid_utf8_tolower.rb index 21051e1fc0..32987db23d 100644 --- a/modules/encoders/x86/avoid_utf8_tolower.rb +++ b/modules/encoders/x86/avoid_utf8_tolower.rb @@ -113,7 +113,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'Avoid UTF8/tolower', - 'Version' => '$Revision$', 'Description' => 'UTF8 Safe, tolower Safe Encoder', 'Author' => 'skape', 'Arch' => ARCH_X86, diff --git a/modules/encoders/x86/call4_dword_xor.rb b/modules/encoders/x86/call4_dword_xor.rb index 82072ac060..e66ae57ec0 100644 --- a/modules/encoders/x86/call4_dword_xor.rb +++ b/modules/encoders/x86/call4_dword_xor.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'Call+4 Dword XOR Encoder', - 'Version' => '$Revision$', 'Description' => 'Call+4 Dword XOR Encoder', 'Author' => [ 'hdm', 'spoonm' ], 'Arch' => ARCH_X86, diff --git a/modules/encoders/x86/context_cpuid.rb b/modules/encoders/x86/context_cpuid.rb index 2355659456..4e305f93ce 100644 --- a/modules/encoders/x86/context_cpuid.rb +++ b/modules/encoders/x86/context_cpuid.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback def initialize super( 'Name' => 'CPUID-based Context Keyed Payload Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This is a Context-Keyed Payload Encoder based on CPUID and Shikata Ga Nai. }, diff --git a/modules/encoders/x86/context_stat.rb b/modules/encoders/x86/context_stat.rb index 0b70208f52..e8c4282835 100644 --- a/modules/encoders/x86/context_stat.rb +++ b/modules/encoders/x86/context_stat.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback def initialize super( 'Name' => 'stat(2)-based Context Keyed Payload Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This is a Context-Keyed Payload Encoder based on stat(2) and Shikata Ga Nai. diff --git a/modules/encoders/x86/context_time.rb b/modules/encoders/x86/context_time.rb index 60f5447ab0..c59eac19c6 100644 --- a/modules/encoders/x86/context_time.rb +++ b/modules/encoders/x86/context_time.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback def initialize super( 'Name' => 'time(2)-based Context Keyed Payload Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This is a Context-Keyed Payload Encoder based on time(2) and Shikata Ga Nai. diff --git a/modules/encoders/x86/countdown.rb b/modules/encoders/x86/countdown.rb index cbc6b5f0a3..d20785c9dc 100644 --- a/modules/encoders/x86/countdown.rb +++ b/modules/encoders/x86/countdown.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'Single-byte XOR Countdown Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder uses the length of the payload as a position-dependent encoder key to produce a small decoder stub. diff --git a/modules/encoders/x86/fnstenv_mov.rb b/modules/encoders/x86/fnstenv_mov.rb index c82a691b0e..65d79d05a7 100644 --- a/modules/encoders/x86/fnstenv_mov.rb +++ b/modules/encoders/x86/fnstenv_mov.rb @@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor def initialize super( 'Name' => 'Variable-length Fnstenv/mov Dword XOR Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder uses a variable-length mov equivalent instruction with fnstenv for getip. diff --git a/modules/encoders/x86/jmp_call_additive.rb b/modules/encoders/x86/jmp_call_additive.rb index e3aa456051..470d98d567 100644 --- a/modules/encoders/x86/jmp_call_additive.rb +++ b/modules/encoders/x86/jmp_call_additive.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback def initialize super( 'Name' => 'Jump/Call XOR Additive Feedback Encoder', - 'Version' => '$Revision$', 'Description' => 'Jump/Call XOR Additive Feedback', 'Author' => 'skape', 'Arch' => ARCH_X86, diff --git a/modules/encoders/x86/nonalpha.rb b/modules/encoders/x86/nonalpha.rb index d550eec8e5..5c63e4cd16 100644 --- a/modules/encoders/x86/nonalpha.rb +++ b/modules/encoders/x86/nonalpha.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::NonAlpha def initialize super( 'Name' => "Non-Alpha Encoder", - 'Version' => '$Revision$', 'Description' => %q{ Encodes payloads as non-alpha based bytes. This allows payloads to bypass both toupper() and tolower() calls, diff --git a/modules/encoders/x86/nonupper.rb b/modules/encoders/x86/nonupper.rb index 6ca447487b..6c7ae7bb1c 100644 --- a/modules/encoders/x86/nonupper.rb +++ b/modules/encoders/x86/nonupper.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::NonUpper def initialize super( 'Name' => "Non-Upper Encoder", - 'Version' => '$Revision$', 'Description' => %q{ Encodes payloads as non-alpha based bytes. This allows payloads to bypass tolower() calls, but will fail isalpha(). diff --git a/modules/encoders/x86/shikata_ga_nai.rb b/modules/encoders/x86/shikata_ga_nai.rb index 6f5f31b349..6cfeec98ea 100644 --- a/modules/encoders/x86/shikata_ga_nai.rb +++ b/modules/encoders/x86/shikata_ga_nai.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback def initialize super( 'Name' => 'Polymorphic XOR Additive Feedback Encoder', - 'Version' => '$Revision$', 'Description' => %q{ This encoder implements a polymorphic XOR additive feedback encoder. The decoder stub is generated based on dynamic instruction diff --git a/modules/encoders/x86/single_static_bit.rb b/modules/encoders/x86/single_static_bit.rb index 7d0810d986..569cc9db39 100644 --- a/modules/encoders/x86/single_static_bit.rb +++ b/modules/encoders/x86/single_static_bit.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Encoder def initialize super( 'Name' => 'Single Static Bit', - 'Version' => '$Revision$', 'Description' => 'Static value for specific bit', 'Author' => 'jduck', 'Arch' => ARCH_X86, diff --git a/modules/encoders/x86/unicode_mixed.rb b/modules/encoders/x86/unicode_mixed.rb index 8b4c37cb1d..43f754d7cb 100644 --- a/modules/encoders/x86/unicode_mixed.rb +++ b/modules/encoders/x86/unicode_mixed.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::Alphanum def initialize super( 'Name' => "Alpha2 Alphanumeric Unicode Mixedcase Encoder", - 'Version' => '$Revision$', 'Description' => %q{ Encodes payloads as unicode-safe mixedcase text. This encoder uses SkyLined's Alpha2 encoding suite. diff --git a/modules/encoders/x86/unicode_upper.rb b/modules/encoders/x86/unicode_upper.rb index db109901e1..65e05a0f69 100644 --- a/modules/encoders/x86/unicode_upper.rb +++ b/modules/encoders/x86/unicode_upper.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::Alphanum def initialize super( 'Name' => "Alpha2 Alphanumeric Unicode Uppercase Encoder", - 'Version' => '$Revision$', 'Description' => %q{ Encodes payload as unicode-safe uppercase text. This encoder uses SkyLined's Alpha2 encoding suite. diff --git a/modules/exploits/aix/rpc_cmsd_opcode21.rb b/modules/exploits/aix/rpc_cmsd_opcode21.rb index 36ea136c53..11020201af 100644 --- a/modules/exploits/aix/rpc_cmsd_opcode21.rb +++ b/modules/exploits/aix/rpc_cmsd_opcode21.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Rodrigo Rubira Branco (BSDaemon)', 'jduck', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3699' ], diff --git a/modules/exploits/aix/rpc_ttdbserverd_realpath.rb b/modules/exploits/aix/rpc_ttdbserverd_realpath.rb index 98a9ba43df..cf61ce9ea8 100644 --- a/modules/exploits/aix/rpc_ttdbserverd_realpath.rb +++ b/modules/exploits/aix/rpc_ttdbserverd_realpath.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Ramon de C Valle', 'Adriano Lima ', ], - 'Version' => '$Revision$', 'Platform' => [ 'aix' ], 'References' => [ diff --git a/modules/exploits/apple_ios/browser/safari_libtiff.rb b/modules/exploits/apple_ios/browser/safari_libtiff.rb index 5b391b90b1..d9cb3f2ce8 100644 --- a/modules/exploits/apple_ios/browser/safari_libtiff.rb +++ b/modules/exploits/apple_ios/browser/safari_libtiff.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['hdm', 'kf'], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3459'], diff --git a/modules/exploits/apple_ios/email/mobilemail_libtiff.rb b/modules/exploits/apple_ios/email/mobilemail_libtiff.rb index 5c8cb487a1..8a819a630d 100644 --- a/modules/exploits/apple_ios/email/mobilemail_libtiff.rb +++ b/modules/exploits/apple_ios/email/mobilemail_libtiff.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['hdm', 'kf'], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3459'], diff --git a/modules/exploits/bsdi/softcart/mercantec_softcart.rb b/modules/exploits/bsdi/softcart/mercantec_softcart.rb index ff5758e3b7..c7055290a9 100644 --- a/modules/exploits/bsdi/softcart/mercantec_softcart.rb +++ b/modules/exploits/bsdi/softcart/mercantec_softcart.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 4.00b. }, 'Author' => [ 'skape', 'trew' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2221'], diff --git a/modules/exploits/dialup/multi/login/manyargs.rb b/modules/exploits/dialup/multi/login/manyargs.rb index b3ba6482e1..f335e604f4 100644 --- a/modules/exploits/dialup/multi/login/manyargs.rb +++ b/modules/exploits/dialup/multi/login/manyargs.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2002-10/0014.html'], [ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-12/0404.html'], ], - 'Version' => '$Revision$', 'Author' => [ 'I)ruid', diff --git a/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb b/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb index 09e1330eb7..cb7d6181e5 100644 --- a/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb +++ b/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote execute arbitrary code. }, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-4221'], diff --git a/modules/exploits/freebsd/samba/trans2open.rb b/modules/exploits/freebsd/samba/trans2open.rb index f182de1732..033b0fa0cc 100644 --- a/modules/exploits/freebsd/samba/trans2open.rb +++ b/modules/exploits/freebsd/samba/trans2open.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0201' ], diff --git a/modules/exploits/freebsd/tacacs/xtacacsd_report.rb b/modules/exploits/freebsd/tacacs/xtacacsd_report.rb index 9205302b7c..d9ff42c886 100644 --- a/modules/exploits/freebsd/tacacs/xtacacsd_report.rb +++ b/modules/exploits/freebsd/tacacs/xtacacsd_report.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote username, an attacker may be able to execute arbitrary code. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-7232'], diff --git a/modules/exploits/hpux/lpd/cleanup_exec.rb b/modules/exploits/hpux/lpd/cleanup_exec.rb index bd4c725aa4..b7e7307e38 100644 --- a/modules/exploits/hpux/lpd/cleanup_exec.rb +++ b/modules/exploits/hpux/lpd/cleanup_exec.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote HPSBUX0208-213. }, 'Author' => [ 'hdm' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-1473'], diff --git a/modules/exploits/irix/lpd/tagprinter_exec.rb b/modules/exploits/irix/lpd/tagprinter_exec.rb index 3f4c91b9d5..51bceebb53 100644 --- a/modules/exploits/irix/lpd/tagprinter_exec.rb +++ b/modules/exploits/irix/lpd/tagprinter_exec.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'optyx', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2001-0800'], diff --git a/modules/exploits/linux/ftp/proftp_sreplace.rb b/modules/exploits/linux/ftp/proftp_sreplace.rb index 8ca7aa1326..6639ede3bb 100644 --- a/modules/exploits/linux/ftp/proftp_sreplace.rb +++ b/modules/exploits/linux/ftp/proftp_sreplace.rb @@ -52,7 +52,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Evgeny Legerov ', # original .pm version (VulnDisco) 'jduck' # Metasploit 3.x port ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5815' ], diff --git a/modules/exploits/linux/ftp/proftp_telnet_iac.rb b/modules/exploits/linux/ftp/proftp_telnet_iac.rb index a88cfa4b2b..4ae4c0525b 100644 --- a/modules/exploits/linux/ftp/proftp_telnet_iac.rb +++ b/modules/exploits/linux/ftp/proftp_telnet_iac.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote and could allow exploitation in semi-reasonable amount of time. }, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-4221'], diff --git a/modules/exploits/linux/games/ut2004_secure.rb b/modules/exploits/linux/games/ut2004_secure.rb index 049d3da217..8b357d9f39 100644 --- a/modules/exploits/linux/games/ut2004_secure.rb +++ b/modules/exploits/linux/games/ut2004_secure.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'onetwo' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0608'], diff --git a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb index 7ebe8502c4..dd80800e1f 100644 --- a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb +++ b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '40521' ], diff --git a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb index 9f203c09c8..1e2ff45fc4 100644 --- a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb +++ b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'gat3way', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2765' ], diff --git a/modules/exploits/linux/http/gpsd_format_string.rb b/modules/exploits/linux/http/gpsd_format_string.rb index 7480062360..786989bff5 100644 --- a/modules/exploits/linux/http/gpsd_format_string.rb +++ b/modules/exploits/linux/http/gpsd_format_string.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Yann Senotier ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1388' ], diff --git a/modules/exploits/linux/http/linksys_apply_cgi.rb b/modules/exploits/linux/http/linksys_apply_cgi.rb index 05a422462d..ab6a11aa53 100644 --- a/modules/exploits/linux/http/linksys_apply_cgi.rb +++ b/modules/exploits/linux/http/linksys_apply_cgi.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Raphael Rigo ', 'Julien Tinnes ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2799'], diff --git a/modules/exploits/linux/http/peercast_url.rb b/modules/exploits/linux/http/peercast_url.rb index 18fe402d38..26a9d84bb5 100644 --- a/modules/exploits/linux/http/peercast_url.rb +++ b/modules/exploits/linux/http/peercast_url.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-1148'], diff --git a/modules/exploits/linux/http/piranha_passwd_exec.rb b/modules/exploits/linux/http/piranha_passwd_exec.rb index 8474a904f4..d87027cadb 100644 --- a/modules/exploits/linux/http/piranha_passwd_exec.rb +++ b/modules/exploits/linux/http/piranha_passwd_exec.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # Default password diff --git a/modules/exploits/linux/http/webid_converter.rb b/modules/exploits/linux/http/webid_converter.rb index 610c3dda19..673db6bc4f 100644 --- a/modules/exploits/linux/http/webid_converter.rb +++ b/modules/exploits/linux/http/webid_converter.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'EDB', '17487' ], [ 'URL', 'http://www.webidsupport.com/forums/showthread.php?3892' ] ], - 'Version' => '$Revision$', 'Privileged' => false, 'Platform' => ['php'], 'Arch' => ARCH_PHP, diff --git a/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb b/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb index 731b59e1cb..c1840dcc11 100644 --- a/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb +++ b/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Brendan Coles ', # Discovery and exploit ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Privileged' => false, 'Arch' => ARCH_CMD, 'Platform' => 'unix', diff --git a/modules/exploits/linux/ids/snortbopre.rb b/modules/exploits/linux/ids/snortbopre.rb index 091f8c0e45..06b05869f3 100644 --- a/modules/exploits/linux/ids/snortbopre.rb +++ b/modules/exploits/linux/ids/snortbopre.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'KaiJern Lau ', 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-3252'], diff --git a/modules/exploits/linux/imap/imap_uw_lsub.rb b/modules/exploits/linux/imap/imap_uw_lsub.rb index 462d157ffe..b51409b501 100644 --- a/modules/exploits/linux/imap/imap_uw_lsub.rb +++ b/modules/exploits/linux/imap/imap_uw_lsub.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick', 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2000-0284' ], diff --git a/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb b/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb index 560bd8e576..f83ab68a01 100644 --- a/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb +++ b/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb @@ -53,7 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Laurent Butti <0x9090 at gmail.com>' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-6332'], diff --git a/modules/exploits/linux/misc/accellion_fta_mpipe2.rb b/modules/exploits/linux/misc/accellion_fta_mpipe2.rb index a6d44e62c7..fe6bcb3d62 100644 --- a/modules/exploits/linux/misc/accellion_fta_mpipe2.rb +++ b/modules/exploits/linux/misc/accellion_fta_mpipe2.rb @@ -37,7 +37,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '71362'], diff --git a/modules/exploits/linux/misc/drb_remote_codeexec.rb b/modules/exploits/linux/misc/drb_remote_codeexec.rb index 2687316eda..2853947ced 100644 --- a/modules/exploits/linux/misc/drb_remote_codeexec.rb +++ b/modules/exploits/linux/misc/drb_remote_codeexec.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'joernchen ' ], #(Phenoelit) 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ], diff --git a/modules/exploits/linux/misc/gld_postfix.rb b/modules/exploits/linux/misc/gld_postfix.rb index 1f8d9b3dff..2b02a36531 100644 --- a/modules/exploits/linux/misc/gld_postfix.rb +++ b/modules/exploits/linux/misc/gld_postfix.rb @@ -22,7 +22,6 @@ require 'msf/core' GLD <= 1.4 greylisting daemon for Postfix. By sending an overly long string the stack can be overwritten. }, - 'Version' => '$Revision$', 'Author' => [ 'patrick' ], 'Arch' => ARCH_X86, 'Platform' => 'linux', diff --git a/modules/exploits/linux/misc/hplip_hpssd_exec.rb b/modules/exploits/linux/misc/hplip_hpssd_exec.rb index f8f3142ffe..47a4d023ea 100644 --- a/modules/exploits/linux/misc/hplip_hpssd_exec.rb +++ b/modules/exploits/linux/misc/hplip_hpssd_exec.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5208' ], diff --git a/modules/exploits/linux/misc/ib_inet_connect.rb b/modules/exploits/linux/misc/ib_inet_connect.rb index babd37b9cf..4f7ff8799f 100644 --- a/modules/exploits/linux/misc/ib_inet_connect.rb +++ b/modules/exploits/linux/misc/ib_inet_connect.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted service attach request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/linux/misc/ib_jrd8_create_database.rb b/modules/exploits/linux/misc/ib_jrd8_create_database.rb index 567d95e89b..923f55b27c 100644 --- a/modules/exploits/linux/misc/ib_jrd8_create_database.rb +++ b/modules/exploits/linux/misc/ib_jrd8_create_database.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted create request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/linux/misc/ib_open_marker_file.rb b/modules/exploits/linux/misc/ib_open_marker_file.rb index 4ede29bbcd..99a7ccd5a0 100644 --- a/modules/exploits/linux/misc/ib_open_marker_file.rb +++ b/modules/exploits/linux/misc/ib_open_marker_file.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted attach request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/linux/misc/ib_pwd_db_aliased.rb b/modules/exploits/linux/misc/ib_pwd_db_aliased.rb index 83e8ef86fe..4de10b35a2 100644 --- a/modules/exploits/linux/misc/ib_pwd_db_aliased.rb +++ b/modules/exploits/linux/misc/ib_pwd_db_aliased.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted attach request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/linux/misc/lprng_format_string.rb b/modules/exploits/linux/misc/lprng_format_string.rb index 0e105034c3..29ccfd9b54 100644 --- a/modules/exploits/linux/misc/lprng_format_string.rb +++ b/modules/exploits/linux/misc/lprng_format_string.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2000-0917' ], diff --git a/modules/exploits/linux/misc/netsupport_manager_agent.rb b/modules/exploits/linux/misc/netsupport_manager_agent.rb index e005fedec7..fd38166282 100644 --- a/modules/exploits/linux/misc/netsupport_manager_agent.rb +++ b/modules/exploits/linux/misc/netsupport_manager_agent.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Arch' => ARCH_X86, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-0404' ], diff --git a/modules/exploits/linux/mysql/mysql_yassl_getname.rb b/modules/exploits/linux/mysql/mysql_yassl_getname.rb index 1db722b7b3..9735c19234 100644 --- a/modules/exploits/linux/mysql/mysql_yassl_getname.rb +++ b/modules/exploits/linux/mysql/mysql_yassl_getname.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4484' ], diff --git a/modules/exploits/linux/mysql/mysql_yassl_hello.rb b/modules/exploits/linux/mysql/mysql_yassl_hello.rb index 77e5741a09..744e4b6d57 100644 --- a/modules/exploits/linux/mysql/mysql_yassl_hello.rb +++ b/modules/exploits/linux/mysql/mysql_yassl_hello.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0226' ], diff --git a/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb b/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb index 38ef7f4e8e..6b1f381c96 100644 --- a/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb +++ b/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'bannedit', 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2502' ], diff --git a/modules/exploits/linux/pptp/poptop_negative_read.rb b/modules/exploits/linux/pptp/poptop_negative_read.rb index 18e6073b0f..9f4968e534 100644 --- a/modules/exploits/linux/pptp/poptop_negative_read.rb +++ b/modules/exploits/linux/pptp/poptop_negative_read.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'spoonm', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2003-0213'], diff --git a/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb b/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb index efb934d755..39d9cb273f 100644 --- a/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb +++ b/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote defined length. Props to iDEFENSE for the advisory. }, 'Author' => 'skape', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0541'], diff --git a/modules/exploits/linux/samba/chain_reply.rb b/modules/exploits/linux/samba/chain_reply.rb index 4696a1efd3..37566faa9d 100644 --- a/modules/exploits/linux/samba/chain_reply.rb +++ b/modules/exploits/linux/samba/chain_reply.rb @@ -45,7 +45,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2063' ], diff --git a/modules/exploits/linux/samba/lsa_transnames_heap.rb b/modules/exploits/linux/samba/lsa_transnames_heap.rb index 71c020251c..bd903892bf 100644 --- a/modules/exploits/linux/samba/lsa_transnames_heap.rb +++ b/modules/exploits/linux/samba/lsa_transnames_heap.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2446'], diff --git a/modules/exploits/linux/samba/trans2open.rb b/modules/exploits/linux/samba/trans2open.rb index 28b713e735..5ed46e581c 100644 --- a/modules/exploits/linux/samba/trans2open.rb +++ b/modules/exploits/linux/samba/trans2open.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0201' ], diff --git a/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb b/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb index 61e982f420..9ff787e252 100644 --- a/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb +++ b/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb @@ -16,7 +16,6 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, { 'Name' => 'F5 BIG-IP SSH Private Key Exposure', - 'Version' => '$Revision$', 'Description' => %q{ F5 ships a public/private key pair on BIG-IP appliances that allows passwordless authentication to any other BIG-IP box. Since the key is diff --git a/modules/exploits/multi/browser/firefox_escape_retval.rb b/modules/exploits/multi/browser/firefox_escape_retval.rb index 63892f737c..606e6c901f 100644 --- a/modules/exploits/multi/browser/firefox_escape_retval.rb +++ b/modules/exploits/multi/browser/firefox_escape_retval.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Simon Berry-Byrne ', # Author / Publisher / Original exploit 'hdm', # Metasploit conversion ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2009-2477'], diff --git a/modules/exploits/multi/browser/firefox_queryinterface.rb b/modules/exploits/multi/browser/firefox_queryinterface.rb index 6f9a27af43..87a0261347 100644 --- a/modules/exploits/multi/browser/firefox_queryinterface.rb +++ b/modules/exploits/multi/browser/firefox_queryinterface.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['hdm'], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-0295'], diff --git a/modules/exploits/multi/browser/itms_overflow.rb b/modules/exploits/multi/browser/itms_overflow.rb index 337b43f806..077b0b9b8b 100644 --- a/modules/exploits/multi/browser/itms_overflow.rb +++ b/modules/exploits/multi/browser/itms_overflow.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Will Drewry ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0950' ], diff --git a/modules/exploits/multi/browser/java_calendar_deserialize.rb b/modules/exploits/multi/browser/java_calendar_deserialize.rb index 9fdc45cad0..6ca8e97f5f 100644 --- a/modules/exploits/multi/browser/java_calendar_deserialize.rb +++ b/modules/exploits/multi/browser/java_calendar_deserialize.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'sf', 'hdm' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5353' ], diff --git a/modules/exploits/multi/browser/java_getsoundbank_bof.rb b/modules/exploits/multi/browser/java_getsoundbank_bof.rb index 1b46303add..63f65c2b39 100644 --- a/modules/exploits/multi/browser/java_getsoundbank_bof.rb +++ b/modules/exploits/multi/browser/java_getsoundbank_bof.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote 'kf', # Original PoC/exploit 'jduck' # metasploit version ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3867' ], diff --git a/modules/exploits/multi/browser/java_rmi_connection_impl.rb b/modules/exploits/multi/browser/java_rmi_connection_impl.rb index e258a9ecf4..c3020043fb 100644 --- a/modules/exploits/multi/browser/java_rmi_connection_impl.rb +++ b/modules/exploits/multi/browser/java_rmi_connection_impl.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Matthias Kaiser', # PoC 'egypt' # metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0094' ], diff --git a/modules/exploits/multi/browser/java_setdifficm_bof.rb b/modules/exploits/multi/browser/java_setdifficm_bof.rb index 5877ddac3e..a914ff59f8 100644 --- a/modules/exploits/multi/browser/java_setdifficm_bof.rb +++ b/modules/exploits/multi/browser/java_setdifficm_bof.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3869' ], diff --git a/modules/exploits/multi/browser/java_signed_applet.rb b/modules/exploits/multi/browser/java_signed_applet.rb index 5825698915..dc01bdc41a 100644 --- a/modules/exploits/multi/browser/java_signed_applet.rb +++ b/modules/exploits/multi/browser/java_signed_applet.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'natron' ], - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-valsmith-metaphish.pdf' ], diff --git a/modules/exploits/multi/browser/java_trusted_chain.rb b/modules/exploits/multi/browser/java_trusted_chain.rb index 160caf0678..5075220eb9 100644 --- a/modules/exploits/multi/browser/java_trusted_chain.rb +++ b/modules/exploits/multi/browser/java_trusted_chain.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Matthias Kaiser', # PoC 'egypt' # metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0840' ], diff --git a/modules/exploits/multi/browser/mozilla_compareto.rb b/modules/exploits/multi/browser/mozilla_compareto.rb index bf57ea5d00..e5d6f0fc81 100644 --- a/modules/exploits/multi/browser/mozilla_compareto.rb +++ b/modules/exploits/multi/browser/mozilla_compareto.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['hdm', 'Aviv Raff '], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2265'], diff --git a/modules/exploits/multi/browser/mozilla_navigatorjava.rb b/modules/exploits/multi/browser/mozilla_navigatorjava.rb index 2fa9337ecc..66dd676e5f 100644 --- a/modules/exploits/multi/browser/mozilla_navigatorjava.rb +++ b/modules/exploits/multi/browser/mozilla_navigatorjava.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['hdm'], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3677'], diff --git a/modules/exploits/multi/browser/opera_configoverwrite.rb b/modules/exploits/multi/browser/opera_configoverwrite.rb index 1d173ad126..f0e9534b78 100644 --- a/modules/exploits/multi/browser/opera_configoverwrite.rb +++ b/modules/exploits/multi/browser/opera_configoverwrite.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'egypt', # stolen from mpack ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '66472'], diff --git a/modules/exploits/multi/browser/opera_historysearch.rb b/modules/exploits/multi/browser/opera_historysearch.rb index f5b461e90b..2b0af53a2e 100644 --- a/modules/exploits/multi/browser/opera_historysearch.rb +++ b/modules/exploits/multi/browser/opera_historysearch.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Aviv Raff ', # showed it to be exploitable for code exec 'egypt', # msf module ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-4696'], diff --git a/modules/exploits/multi/browser/qtjava_pointer.rb b/modules/exploits/multi/browser/qtjava_pointer.rb index 60d62d71c0..45e5d24a54 100644 --- a/modules/exploits/multi/browser/qtjava_pointer.rb +++ b/modules/exploits/multi/browser/qtjava_pointer.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'kf', # Added support for Mac OS X X86 'ddz' # Discovered bug, provided tips ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2175'], diff --git a/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb b/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb index 7c532c3dff..6479583f8a 100644 --- a/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb +++ b/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Felipe Andres Manzano ', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2990' ], diff --git a/modules/exploits/multi/fileformat/maple_maplet.rb b/modules/exploits/multi/fileformat/maple_maplet.rb index 215ffd5acf..ba2e08299b 100644 --- a/modules/exploits/multi/fileformat/maple_maplet.rb +++ b/modules/exploits/multi/fileformat/maple_maplet.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'scriptjunkie' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64541'], diff --git a/modules/exploits/multi/fileformat/peazip_command_injection.rb b/modules/exploits/multi/fileformat/peazip_command_injection.rb index 27511c48fd..46715783ae 100644 --- a/modules/exploits/multi/fileformat/peazip_command_injection.rb +++ b/modules/exploits/multi/fileformat/peazip_command_injection.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Nine:Situations:Group::pyrokinesis', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2261' ], diff --git a/modules/exploits/multi/ftp/wuftpd_site_exec_format.rb b/modules/exploits/multi/ftp/wuftpd_site_exec_format.rb index ef36adf7b7..b0335b8fd0 100644 --- a/modules/exploits/multi/ftp/wuftpd_site_exec_format.rb +++ b/modules/exploits/multi/ftp/wuftpd_site_exec_format.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote specifiers, an attacker can corrupt memory and execute arbitrary code. }, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2000-0573'], diff --git a/modules/exploits/multi/handler.rb b/modules/exploits/multi/handler.rb index bec2c1ed89..bf541b1d47 100644 --- a/modules/exploits/multi/handler.rb +++ b/modules/exploits/multi/handler.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['hdm'], - 'Version' => '$Revision$', 'References' => [ ], 'Payload' => { diff --git a/modules/exploits/multi/http/freenas_exec_raw.rb b/modules/exploits/multi/http/freenas_exec_raw.rb index 71e2dec71e..94f76a22c1 100644 --- a/modules/exploits/multi/http/freenas_exec_raw.rb +++ b/modules/exploits/multi/http/freenas_exec_raw.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://sourceforge.net/projects/freenas/files/stable/0.7.2/NOTES%200.7.2.5543.txt/download' ], diff --git a/modules/exploits/multi/http/glassfish_deployer.rb b/modules/exploits/multi/http/glassfish_deployer.rb index c0b81a7406..33a034e39c 100644 --- a/modules/exploits/multi/http/glassfish_deployer.rb +++ b/modules/exploits/multi/http/glassfish_deployer.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote this module will try to bypass authentication instead by sending lowercase HTTP verbs. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ #Msf module for Glassfish 3.0 diff --git a/modules/exploits/multi/http/jboss_bshdeployer.rb b/modules/exploits/multi/http/jboss_bshdeployer.rb index dee3dfbf6c..fd14dd671d 100644 --- a/modules/exploits/multi/http/jboss_bshdeployer.rb +++ b/modules/exploits/multi/http/jboss_bshdeployer.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'h0ng10' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0738' ], # using a VERB other than GET/POST diff --git a/modules/exploits/multi/http/jboss_deploymentfilerepository.rb b/modules/exploits/multi/http/jboss_deploymentfilerepository.rb index 09da6021f2..6b42a7312d 100644 --- a/modules/exploits/multi/http/jboss_deploymentfilerepository.rb +++ b/modules/exploits/multi/http/jboss_deploymentfilerepository.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'Jacob Giannantonio', 'Patrick Hof', 'h0ng10' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0738' ], # by using VERB other than GET/POST diff --git a/modules/exploits/multi/http/jboss_maindeployer.rb b/modules/exploits/multi/http/jboss_maindeployer.rb index f3f636acfb..a978dc9db6 100644 --- a/modules/exploits/multi/http/jboss_maindeployer.rb +++ b/modules/exploits/multi/http/jboss_maindeployer.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck', 'Patrick Hof', 'h0ng10'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1036' ], diff --git a/modules/exploits/multi/http/php_cgi_arg_injection.rb b/modules/exploits/multi/http/php_cgi_arg_injection.rb index 70693a7084..9ee87e5756 100644 --- a/modules/exploits/multi/http/php_cgi_arg_injection.rb +++ b/modules/exploits/multi/http/php_cgi_arg_injection.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jjarmoc' #added URI encoding obfuscation ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE' , '2012-1823' ], [ 'OSVDB', '81633'], diff --git a/modules/exploits/multi/http/phpldapadmin_query_engine.rb b/modules/exploits/multi/http/phpldapadmin_query_engine.rb index 32690eb7ce..b1c359289d 100644 --- a/modules/exploits/multi/http/phpldapadmin_query_engine.rb +++ b/modules/exploits/multi/http/phpldapadmin_query_engine.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'TecR0c ', # msf ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-4075'], diff --git a/modules/exploits/multi/http/phpmyadmin_3522_backdoor.rb b/modules/exploits/multi/http/phpmyadmin_3522_backdoor.rb index 7ed607abcf..1ebb9d5a24 100644 --- a/modules/exploits/multi/http/phpmyadmin_3522_backdoor.rb +++ b/modules/exploits/multi/http/phpmyadmin_3522_backdoor.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://www.phpmyadmin.net/home_page/security/PMASA-2012-5.php'] ], 'Privileged' => false, 'Payload' => diff --git a/modules/exploits/multi/http/phpscheduleit_start_date.rb b/modules/exploits/multi/http/phpscheduleit_start_date.rb index f0ca25447a..e6b13c6427 100644 --- a/modules/exploits/multi/http/phpscheduleit_start_date.rb +++ b/modules/exploits/multi/http/phpscheduleit_start_date.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'juan vazquez' # Metasploit module ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-6132'], diff --git a/modules/exploits/multi/http/snortreport_exec.rb b/modules/exploits/multi/http/snortreport_exec.rb index 9e58133e04..f4dc3edbaa 100644 --- a/modules/exploits/multi/http/snortreport_exec.rb +++ b/modules/exploits/multi/http/snortreport_exec.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Paul Rascagneres' #itrust consulting during hack.lu 2011 ], - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '67739'], diff --git a/modules/exploits/multi/http/spree_search_exec.rb b/modules/exploits/multi/http/spree_search_exec.rb index 6e58b77c77..e48e1148b7 100644 --- a/modules/exploits/multi/http/spree_search_exec.rb +++ b/modules/exploits/multi/http/spree_search_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'joernchen ' ], #Phenoelit 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '76011'], diff --git a/modules/exploits/multi/http/spree_searchlogic_exec.rb b/modules/exploits/multi/http/spree_searchlogic_exec.rb index 05c2b782d6..3bf8adb859 100644 --- a/modules/exploits/multi/http/spree_searchlogic_exec.rb +++ b/modules/exploits/multi/http/spree_searchlogic_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'joernchen ' ], #Phenoelit 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '71900'], diff --git a/modules/exploits/multi/http/struts_code_exec.rb b/modules/exploits/multi/http/struts_code_exec.rb index fd023e190d..982b3c100d 100644 --- a/modules/exploits/multi/http/struts_code_exec.rb +++ b/modules/exploits/multi/http/struts_code_exec.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Meder Kydyraliev', # original public exploit ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1870'], diff --git a/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb b/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb index 277b65efa4..caa7d8b2da 100644 --- a/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb +++ b/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mihi' # ARCH_JAVA support ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-0391'], diff --git a/modules/exploits/multi/http/sun_jsws_dav_options.rb b/modules/exploits/multi/http/sun_jsws_dav_options.rb index f8a035e9ac..7676d62c8b 100644 --- a/modules/exploits/multi/http/sun_jsws_dav_options.rb +++ b/modules/exploits/multi/http/sun_jsws_dav_options.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote Intevydis. }, 'Author' => 'jduck', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0361' ], diff --git a/modules/exploits/multi/http/tomcat_mgr_deploy.rb b/modules/exploits/multi/http/tomcat_mgr_deploy.rb index 8703918f99..831e31a30d 100644 --- a/modules/exploits/multi/http/tomcat_mgr_deploy.rb +++ b/modules/exploits/multi/http/tomcat_mgr_deploy.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # There is no single vulnerability associated with deployment functionality. diff --git a/modules/exploits/multi/misc/java_rmi_server.rb b/modules/exploits/multi/misc/java_rmi_server.rb index ab84c42a19..2c13434db8 100644 --- a/modules/exploits/multi/misc/java_rmi_server.rb +++ b/modules/exploits/multi/misc/java_rmi_server.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'mihi' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # RMI protocol specification diff --git a/modules/exploits/multi/misc/openview_omniback_exec.rb b/modules/exploits/multi/misc/openview_omniback_exec.rb index 3eb1090a41..618d3ecf54 100644 --- a/modules/exploits/multi/misc/openview_omniback_exec.rb +++ b/modules/exploits/multi/misc/openview_omniback_exec.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2001-0311'], diff --git a/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb b/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb index 660d586be4..dfd9b3dd1f 100644 --- a/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb +++ b/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1389' ], diff --git a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb index 7756e2cb9d..2c9a14a689 100644 --- a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb +++ b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote 'redsand' # windows target/testing ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0304' ], diff --git a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb index 8ee896f9ad..a02d71e633 100644 --- a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb +++ b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'redsand' # windows target/testing ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0304' ], diff --git a/modules/exploits/multi/misc/zend_java_bridge.rb b/modules/exploits/multi/misc/zend_java_bridge.rb index c6353de1a0..0bd37ab9c7 100644 --- a/modules/exploits/multi/misc/zend_java_bridge.rb +++ b/modules/exploits/multi/misc/zend_java_bridge.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'bannedit' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '71420'], diff --git a/modules/exploits/multi/ntp/ntp_overflow.rb b/modules/exploits/multi/ntp/ntp_overflow.rb index e2e96cb69d..168cb57a67 100644 --- a/modules/exploits/multi/ntp/ntp_overflow.rb +++ b/modules/exploits/multi/ntp/ntp_overflow.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'patrick', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0414' ], diff --git a/modules/exploits/multi/php/php_unserialize_zval_cookie.rb b/modules/exploits/multi/php/php_unserialize_zval_cookie.rb index fc47f14eba..768ebea6bc 100644 --- a/modules/exploits/multi/php/php_unserialize_zval_cookie.rb +++ b/modules/exploits/multi/php/php_unserialize_zval_cookie.rb @@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Stefan Esser ' # discovered, patched, exploited ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-1286'], diff --git a/modules/exploits/multi/realserver/describe.rb b/modules/exploits/multi/realserver/describe.rb index 2ee5511237..431750599e 100644 --- a/modules/exploits/multi/realserver/describe.rb +++ b/modules/exploits/multi/realserver/describe.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote servers. }, 'Author' => 'hdm', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-1643' ], diff --git a/modules/exploits/multi/samba/nttrans.rb b/modules/exploits/multi/samba/nttrans.rb index d2ee30053a..da00c38fc2 100644 --- a/modules/exploits/multi/samba/nttrans.rb +++ b/modules/exploits/multi/samba/nttrans.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-1318' ], diff --git a/modules/exploits/multi/samba/usermap_script.rb b/modules/exploits/multi/samba/usermap_script.rb index e5bdb4f8ce..e67a4d5106 100644 --- a/modules/exploits/multi/samba/usermap_script.rb +++ b/modules/exploits/multi/samba/usermap_script.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2447' ], diff --git a/modules/exploits/multi/svn/svnserve_date.rb b/modules/exploits/multi/svn/svnserve_date.rb index 1829dd158e..38566abeda 100644 --- a/modules/exploits/multi/svn/svnserve_date.rb +++ b/modules/exploits/multi/svn/svnserve_date.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote it during testing) corrupt the subversion database, so be careful! }, 'Author' => 'spoonm', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2004-0397'], diff --git a/modules/exploits/multi/wyse/hagent_untrusted_hsdata.rb b/modules/exploits/multi/wyse/hagent_untrusted_hsdata.rb index 2006cb0998..211e9dd7c7 100644 --- a/modules/exploits/multi/wyse/hagent_untrusted_hsdata.rb +++ b/modules/exploits/multi/wyse/hagent_untrusted_hsdata.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Stance' => Msf::Exploit::Stance::Aggressive, 'Author' => 'kf', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2009-0695'], diff --git a/modules/exploits/netware/smb/lsass_cifs.rb b/modules/exploits/netware/smb/lsass_cifs.rb index 5d51d6e23a..4928d83b9e 100644 --- a/modules/exploits/netware/smb/lsass_cifs.rb +++ b/modules/exploits/netware/smb/lsass_cifs.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'toto', ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2852' ], diff --git a/modules/exploits/netware/sunrpc/pkernel_callit.rb b/modules/exploits/netware/sunrpc/pkernel_callit.rb index 9753a457d6..daa9b07ff5 100644 --- a/modules/exploits/netware/sunrpc/pkernel_callit.rb +++ b/modules/exploits/netware/sunrpc/pkernel_callit.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'pahtzo', ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # There is no CVE for this vulnerability diff --git a/modules/exploits/osx/afp/loginext.rb b/modules/exploits/osx/afp/loginext.rb index 869cd45b20..101e29146b 100644 --- a/modules/exploits/osx/afp/loginext.rb +++ b/modules/exploits/osx/afp/loginext.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'hdm', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0430'], diff --git a/modules/exploits/osx/arkeia/type77.rb b/modules/exploits/osx/arkeia/type77.rb index 8e3a7d83fd..22ecd2fd91 100644 --- a/modules/exploits/osx/arkeia/type77.rb +++ b/modules/exploits/osx/arkeia/type77.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0491'], diff --git a/modules/exploits/osx/browser/safari_file_policy.rb b/modules/exploits/osx/browser/safari_file_policy.rb index 42fd0bd076..f4e149e274 100644 --- a/modules/exploits/osx/browser/safari_file_policy.rb +++ b/modules/exploits/osx/browser/safari_file_policy.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote Xcode instead of executing it, in that case please try the Java ones instead. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Aaron Sigel', # Initial discovery diff --git a/modules/exploits/osx/browser/safari_metadata_archive.rb b/modules/exploits/osx/browser/safari_metadata_archive.rb index 1475ef3e26..2d3c818f3c 100644 --- a/modules/exploits/osx/browser/safari_metadata_archive.rb +++ b/modules/exploits/osx/browser/safari_metadata_archive.rb @@ -37,7 +37,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'hdm' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-0848'], diff --git a/modules/exploits/osx/browser/software_update.rb b/modules/exploits/osx/browser/software_update.rb index 2f2ffacefe..3809c46e23 100644 --- a/modules/exploits/osx/browser/software_update.rb +++ b/modules/exploits/osx/browser/software_update.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Moritz Jodeit ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-5863'], diff --git a/modules/exploits/osx/email/mailapp_image_exec.rb b/modules/exploits/osx/email/mailapp_image_exec.rb index d98f8fa656..08cb63b138 100644 --- a/modules/exploits/osx/email/mailapp_image_exec.rb +++ b/modules/exploits/osx/email/mailapp_image_exec.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['hdm', 'kf'], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-0395'], diff --git a/modules/exploits/osx/ftp/webstar_ftp_user.rb b/modules/exploits/osx/ftp/webstar_ftp_user.rb index a779dc8362..41b8219d03 100644 --- a/modules/exploits/osx/ftp/webstar_ftp_user.rb +++ b/modules/exploits/osx/ftp/webstar_ftp_user.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'ddz', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0695'], diff --git a/modules/exploits/osx/http/evocam_webserver.rb b/modules/exploits/osx/http/evocam_webserver.rb index d60ba7bc04..34cf536237 100644 --- a/modules/exploits/osx/http/evocam_webserver.rb +++ b/modules/exploits/osx/http/evocam_webserver.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Paul Harrington', # Original Exploit Author and MSF Module 'dookie', # MSF Module Assistance ], - 'Version' => '$Revision$', 'Platform' => 'osx', 'License' => MSF_LICENSE, 'References' => diff --git a/modules/exploits/osx/mdns/upnp_location.rb b/modules/exploits/osx/mdns/upnp_location.rb index dfccfc7b53..7389b892dd 100644 --- a/modules/exploits/osx/mdns/upnp_location.rb +++ b/modules/exploits/osx/mdns/upnp_location.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'ddz' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '35142' ], diff --git a/modules/exploits/osx/misc/ufo_ai.rb b/modules/exploits/osx/misc/ufo_ai.rb index 0fb5415a19..56f998fad0 100644 --- a/modules/exploits/osx/misc/ufo_ai.rb +++ b/modules/exploits/osx/misc/ufo_ai.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'dookie' # OSX Exploit Author ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '65689' ], diff --git a/modules/exploits/osx/rtsp/quicktime_rtsp_content_type.rb b/modules/exploits/osx/rtsp/quicktime_rtsp_content_type.rb index 7945ab9da9..b1851c4b25 100644 --- a/modules/exploits/osx/rtsp/quicktime_rtsp_content_type.rb +++ b/modules/exploits/osx/rtsp/quicktime_rtsp_content_type.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'MacOS X QuickTime RTSP Content-Type Overflow', # Description? 'Author' => 'unknown', - 'Version' => '$Revision$', 'Platform' => 'osx', 'References' => [ diff --git a/modules/exploits/osx/samba/lsa_transnames_heap.rb b/modules/exploits/osx/samba/lsa_transnames_heap.rb index bb20ac9426..10b4a4812d 100644 --- a/modules/exploits/osx/samba/lsa_transnames_heap.rb +++ b/modules/exploits/osx/samba/lsa_transnames_heap.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2446'], diff --git a/modules/exploits/osx/samba/trans2open.rb b/modules/exploits/osx/samba/trans2open.rb index fc8adba31a..fbee422769 100644 --- a/modules/exploits/osx/samba/trans2open.rb +++ b/modules/exploits/osx/samba/trans2open.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote exploiting the bug on Mac OS X PowerPC systems. }, 'Author' => [ 'hdm', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0201' ], diff --git a/modules/exploits/solaris/dtspcd/heap_noir.rb b/modules/exploits/solaris/dtspcd/heap_noir.rb index 9a959cc17f..f9e7e8c552 100644 --- a/modules/exploits/solaris/dtspcd/heap_noir.rb +++ b/modules/exploits/solaris/dtspcd/heap_noir.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'noir ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0803'], diff --git a/modules/exploits/solaris/lpd/sendmail_exec.rb b/modules/exploits/solaris/lpd/sendmail_exec.rb index e2b425e09f..05a5daf3bc 100644 --- a/modules/exploits/solaris/lpd/sendmail_exec.rb +++ b/modules/exploits/solaris/lpd/sendmail_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'ddz' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-1583'], diff --git a/modules/exploits/solaris/samba/lsa_transnames_heap.rb b/modules/exploits/solaris/samba/lsa_transnames_heap.rb index 9357a9f24a..09bf4efacb 100644 --- a/modules/exploits/solaris/samba/lsa_transnames_heap.rb +++ b/modules/exploits/solaris/samba/lsa_transnames_heap.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2446'], diff --git a/modules/exploits/solaris/samba/trans2open.rb b/modules/exploits/solaris/samba/trans2open.rb index ed54fa6bf4..2ef9fa64ba 100644 --- a/modules/exploits/solaris/samba/trans2open.rb +++ b/modules/exploits/solaris/samba/trans2open.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0201' ], diff --git a/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb b/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb index 9d61925df7..5be0f26242 100644 --- a/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb +++ b/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb @@ -37,7 +37,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Ramon de C Valle', 'Adriano Lima ', ], - 'Version' => '$Revision$', 'Arch' => ARCH_X86, 'Platform' => 'solaris', 'References' => diff --git a/modules/exploits/solaris/sunrpc/sadmind_exec.rb b/modules/exploits/solaris/sunrpc/sadmind_exec.rb index c281359ea2..9a2d955794 100644 --- a/modules/exploits/solaris/sunrpc/sadmind_exec.rb +++ b/modules/exploits/solaris/sunrpc/sadmind_exec.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'vlad902 ', 'hdm', 'cazz' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2003-0722'], diff --git a/modules/exploits/solaris/sunrpc/ypupdated_exec.rb b/modules/exploits/solaris/sunrpc/ypupdated_exec.rb index 94e99be499..393fc48b41 100644 --- a/modules/exploits/solaris/sunrpc/ypupdated_exec.rb +++ b/modules/exploits/solaris/sunrpc/ypupdated_exec.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'I)ruid ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '1999-0209'], diff --git a/modules/exploits/solaris/telnet/fuser.rb b/modules/exploits/solaris/telnet/fuser.rb index cfceb47eea..3edeabe0ac 100644 --- a/modules/exploits/solaris/telnet/fuser.rb +++ b/modules/exploits/solaris/telnet/fuser.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-0882' ], diff --git a/modules/exploits/solaris/telnet/ttyprompt.rb b/modules/exploits/solaris/telnet/ttyprompt.rb index 0ab86110de..4593f7a168 100644 --- a/modules/exploits/solaris/telnet/ttyprompt.rb +++ b/modules/exploits/solaris/telnet/ttyprompt.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'cazz' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0797'], diff --git a/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb b/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb index e34fc33b86..3771bfa58b 100644 --- a/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb +++ b/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'darkharper2' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '69562'], diff --git a/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb b/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb index b2e9e896a5..790c55dcf8 100644 --- a/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb +++ b/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '73573'], diff --git a/modules/exploits/unix/http/contentkeeperweb_mimencode.rb b/modules/exploits/unix/http/contentkeeperweb_mimencode.rb index 91d447121e..bd6c32ac91 100644 --- a/modules/exploits/unix/http/contentkeeperweb_mimencode.rb +++ b/modules/exploits/unix/http/contentkeeperweb_mimencode.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_CMD ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '54551' ], diff --git a/modules/exploits/unix/http/lifesize_room.rb b/modules/exploits/unix/http/lifesize_room.rb index 17317cbd1b..0b889c22c1 100644 --- a/modules/exploits/unix/http/lifesize_room.rb +++ b/modules/exploits/unix/http/lifesize_room.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Spencer McIntyre', ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-2763' ], diff --git a/modules/exploits/unix/irc/unreal_ircd_3281_backdoor.rb b/modules/exploits/unix/irc/unreal_ircd_3281_backdoor.rb index 0632f252cd..4235a82847 100644 --- a/modules/exploits/unix/irc/unreal_ircd_3281_backdoor.rb +++ b/modules/exploits/unix/irc/unreal_ircd_3281_backdoor.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2075' ], diff --git a/modules/exploits/unix/misc/distcc_exec.rb b/modules/exploits/unix/misc/distcc_exec.rb index d32bccc6fa..b7dd86d672 100644 --- a/modules/exploits/unix/misc/distcc_exec.rb +++ b/modules/exploits/unix/misc/distcc_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2687'], diff --git a/modules/exploits/unix/misc/spamassassin_exec.rb b/modules/exploits/unix/misc/spamassassin_exec.rb index a8dc8776f4..653c870f19 100644 --- a/modules/exploits/unix/misc/spamassassin_exec.rb +++ b/modules/exploits/unix/misc/spamassassin_exec.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2447' ], diff --git a/modules/exploits/unix/misc/zabbix_agent_exec.rb b/modules/exploits/unix/misc/zabbix_agent_exec.rb index 855720d062..8ec179bbbc 100644 --- a/modules/exploits/unix/misc/zabbix_agent_exec.rb +++ b/modules/exploits/unix/misc/zabbix_agent_exec.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4502' ], diff --git a/modules/exploits/unix/smtp/clamav_milter_blackhole.rb b/modules/exploits/unix/smtp/clamav_milter_blackhole.rb index b18a8aac42..e64cd1fd27 100644 --- a/modules/exploits/unix/smtp/clamav_milter_blackhole.rb +++ b/modules/exploits/unix/smtp/clamav_milter_blackhole.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4560' ], diff --git a/modules/exploits/unix/smtp/exim4_string_format.rb b/modules/exploits/unix/smtp/exim4_string_format.rb index 75bb11af8e..c2f44a16f8 100644 --- a/modules/exploits/unix/smtp/exim4_string_format.rb +++ b/modules/exploits/unix/smtp/exim4_string_format.rb @@ -48,7 +48,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-4344' ], diff --git a/modules/exploits/unix/webapp/awstats_configdir_exec.rb b/modules/exploits/unix/webapp/awstats_configdir_exec.rb index c9661b76d7..f4c299facb 100644 --- a/modules/exploits/unix/webapp/awstats_configdir_exec.rb +++ b/modules/exploits/unix/webapp/awstats_configdir_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Matteo Cantoni ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-0116'], diff --git a/modules/exploits/unix/webapp/awstats_migrate_exec.rb b/modules/exploits/unix/webapp/awstats_migrate_exec.rb index 5905a6be22..41fc73a8ae 100644 --- a/modules/exploits/unix/webapp/awstats_migrate_exec.rb +++ b/modules/exploits/unix/webapp/awstats_migrate_exec.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-2237'], diff --git a/modules/exploits/unix/webapp/awstatstotals_multisort.rb b/modules/exploits/unix/webapp/awstatstotals_multisort.rb index 620ec2cad9..d1f5daa5fb 100644 --- a/modules/exploits/unix/webapp/awstatstotals_multisort.rb +++ b/modules/exploits/unix/webapp/awstatstotals_multisort.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-3922'], diff --git a/modules/exploits/unix/webapp/barracuda_img_exec.rb b/modules/exploits/unix/webapp/barracuda_img_exec.rb index 0881273285..71bd64e934 100644 --- a/modules/exploits/unix/webapp/barracuda_img_exec.rb +++ b/modules/exploits/unix/webapp/barracuda_img_exec.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Nicolas Gregoire ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2847'], diff --git a/modules/exploits/unix/webapp/base_qry_common.rb b/modules/exploits/unix/webapp/base_qry_common.rb index 1cb1011181..e4c138d430 100644 --- a/modules/exploits/unix/webapp/base_qry_common.rb +++ b/modules/exploits/unix/webapp/base_qry_common.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2685' ], diff --git a/modules/exploits/unix/webapp/cacti_graphimage_exec.rb b/modules/exploits/unix/webapp/cacti_graphimage_exec.rb index 7831e6c378..ecabfff37f 100644 --- a/modules/exploits/unix/webapp/cacti_graphimage_exec.rb +++ b/modules/exploits/unix/webapp/cacti_graphimage_exec.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'David Maciejak ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '17539' ], diff --git a/modules/exploits/unix/webapp/cakephp_cache_corruption.rb b/modules/exploits/unix/webapp/cakephp_cache_corruption.rb index cb67177938..61acc4dc56 100644 --- a/modules/exploits/unix/webapp/cakephp_cache_corruption.rb +++ b/modules/exploits/unix/webapp/cakephp_cache_corruption.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Felix Wilhelm', # poc ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '69352' ], diff --git a/modules/exploits/unix/webapp/citrix_access_gateway_exec.rb b/modules/exploits/unix/webapp/citrix_access_gateway_exec.rb index dd26ead4cf..c92824d02a 100644 --- a/modules/exploits/unix/webapp/citrix_access_gateway_exec.rb +++ b/modules/exploits/unix/webapp/citrix_access_gateway_exec.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Erwin Paternotte', # Exploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-4566' ], diff --git a/modules/exploits/unix/webapp/coppermine_piceditor.rb b/modules/exploits/unix/webapp/coppermine_piceditor.rb index 85e6be4dbe..da9d4193e2 100644 --- a/modules/exploits/unix/webapp/coppermine_piceditor.rb +++ b/modules/exploits/unix/webapp/coppermine_piceditor.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # metasploit version ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0506' ], diff --git a/modules/exploits/unix/webapp/dogfood_spell_exec.rb b/modules/exploits/unix/webapp/dogfood_spell_exec.rb index 2af2a6f88d..b836beb0f8 100644 --- a/modules/exploits/unix/webapp/dogfood_spell_exec.rb +++ b/modules/exploits/unix/webapp/dogfood_spell_exec.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'patrick', # Added check code, QA tested ok 20090303, there are no references (yet). ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '54707' ], diff --git a/modules/exploits/unix/webapp/generic_exec.rb b/modules/exploits/unix/webapp/generic_exec.rb index f7e3e287c0..64f44cdeb1 100644 --- a/modules/exploits/unix/webapp/generic_exec.rb +++ b/modules/exploits/unix/webapp/generic_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ], 'Privileged' => false, 'Payload' => diff --git a/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb b/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb index 8fd854e2f3..1611b9ff2a 100644 --- a/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb +++ b/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-3757'], diff --git a/modules/exploits/unix/webapp/guestbook_ssi_exec.rb b/modules/exploits/unix/webapp/guestbook_ssi_exec.rb index 8fed93c967..c298c6f418 100644 --- a/modules/exploits/unix/webapp/guestbook_ssi_exec.rb +++ b/modules/exploits/unix/webapp/guestbook_ssi_exec.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '1999-1053' ], diff --git a/modules/exploits/unix/webapp/joomla_tinybrowser.rb b/modules/exploits/unix/webapp/joomla_tinybrowser.rb index 37754c5ff5..cdb132c5d9 100644 --- a/modules/exploits/unix/webapp/joomla_tinybrowser.rb +++ b/modules/exploits/unix/webapp/joomla_tinybrowser.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'spinbad ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-4908'], diff --git a/modules/exploits/unix/webapp/mambo_cache_lite.rb b/modules/exploits/unix/webapp/mambo_cache_lite.rb index 55a926d379..bc0b0983a1 100644 --- a/modules/exploits/unix/webapp/mambo_cache_lite.rb +++ b/modules/exploits/unix/webapp/mambo_cache_lite.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2905' ], diff --git a/modules/exploits/unix/webapp/mitel_awc_exec.rb b/modules/exploits/unix/webapp/mitel_awc_exec.rb index 62d6efab31..56675b2f2c 100644 --- a/modules/exploits/unix/webapp/mitel_awc_exec.rb +++ b/modules/exploits/unix/webapp/mitel_awc_exec.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ diff --git a/modules/exploits/unix/webapp/mybb_backdoor.rb b/modules/exploits/unix/webapp/mybb_backdoor.rb index 9b46cab27a..e33c230a4e 100644 --- a/modules/exploits/unix/webapp/mybb_backdoor.rb +++ b/modules/exploits/unix/webapp/mybb_backdoor.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote 'tdz', ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '49993' ], diff --git a/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb b/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb index e841b59303..87fe6e5e0e 100644 --- a/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb +++ b/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2288' ], diff --git a/modules/exploits/unix/webapp/openview_connectednodes_exec.rb b/modules/exploits/unix/webapp/openview_connectednodes_exec.rb index 4e34c9304f..4606ba9cd5 100644 --- a/modules/exploits/unix/webapp/openview_connectednodes_exec.rb +++ b/modules/exploits/unix/webapp/openview_connectednodes_exec.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Valerio Tesei ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2773'], diff --git a/modules/exploits/unix/webapp/openx_banner_edit.rb b/modules/exploits/unix/webapp/openx_banner_edit.rb index f00bb3a598..9382f18e03 100644 --- a/modules/exploits/unix/webapp/openx_banner_edit.rb +++ b/modules/exploits/unix/webapp/openx_banner_edit.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4098' ], diff --git a/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb b/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb index 037e49db01..9865c8716b 100644 --- a/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb +++ b/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # ovs-agent.spec:- Fix ovs agent command injection [orabug 10146644] {CVE-2010-3585} diff --git a/modules/exploits/unix/webapp/oscommerce_filemanager.rb b/modules/exploits/unix/webapp/oscommerce_filemanager.rb index 7da3c173df..5613c667a9 100644 --- a/modules/exploits/unix/webapp/oscommerce_filemanager.rb +++ b/modules/exploits/unix/webapp/oscommerce_filemanager.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'egypt' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '60018' ], diff --git a/modules/exploits/unix/webapp/pajax_remote_exec.rb b/modules/exploits/unix/webapp/pajax_remote_exec.rb index d996342cbe..f0de4a8ebd 100644 --- a/modules/exploits/unix/webapp/pajax_remote_exec.rb +++ b/modules/exploits/unix/webapp/pajax_remote_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Matteo Cantoni ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-1551'], diff --git a/modules/exploits/unix/webapp/php_eval.rb b/modules/exploits/unix/webapp/php_eval.rb index 5f65c9fe86..46de6cd341 100644 --- a/modules/exploits/unix/webapp/php_eval.rb +++ b/modules/exploits/unix/webapp/php_eval.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'egypt' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ ], 'Privileged' => false, 'Platform' => ['php'], diff --git a/modules/exploits/unix/webapp/php_vbulletin_template.rb b/modules/exploits/unix/webapp/php_vbulletin_template.rb index 7ff5ef42ed..d6d59178ac 100644 --- a/modules/exploits/unix/webapp/php_vbulletin_template.rb +++ b/modules/exploits/unix/webapp/php_vbulletin_template.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'cazz' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0511' ], diff --git a/modules/exploits/unix/webapp/php_wordpress_foxypress.rb b/modules/exploits/unix/webapp/php_wordpress_foxypress.rb index e14d898a7f..aac6754e20 100644 --- a/modules/exploits/unix/webapp/php_wordpress_foxypress.rb +++ b/modules/exploits/unix/webapp/php_wordpress_foxypress.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'patrick' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['EDB', '18991'], diff --git a/modules/exploits/unix/webapp/php_wordpress_lastpost.rb b/modules/exploits/unix/webapp/php_wordpress_lastpost.rb index 5d6a93f30c..e793025eec 100644 --- a/modules/exploits/unix/webapp/php_wordpress_lastpost.rb +++ b/modules/exploits/unix/webapp/php_wordpress_lastpost.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'str0ke ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2612'], diff --git a/modules/exploits/unix/webapp/php_xmlrpc_eval.rb b/modules/exploits/unix/webapp/php_xmlrpc_eval.rb index fc374a6fb8..341324be22 100644 --- a/modules/exploits/unix/webapp/php_xmlrpc_eval.rb +++ b/modules/exploits/unix/webapp/php_xmlrpc_eval.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'cazz' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-1921'], diff --git a/modules/exploits/unix/webapp/phpbb_highlight.rb b/modules/exploits/unix/webapp/phpbb_highlight.rb index 077c6287f3..cf373af75f 100644 --- a/modules/exploits/unix/webapp/phpbb_highlight.rb +++ b/modules/exploits/unix/webapp/phpbb_highlight.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'valsmith[at]metasploit.com', 'hdm', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2086'], diff --git a/modules/exploits/unix/webapp/phpmyadmin_config.rb b/modules/exploits/unix/webapp/phpmyadmin_config.rb index 0a88755015..00ec94d57e 100644 --- a/modules/exploits/unix/webapp/phpmyadmin_config.rb +++ b/modules/exploits/unix/webapp/phpmyadmin_config.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Exploit::Remote 'egypt' # metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1151' ], diff --git a/modules/exploits/unix/webapp/qtss_parse_xml_exec.rb b/modules/exploits/unix/webapp/qtss_parse_xml_exec.rb index 2d96d5f400..31ee74043e 100644 --- a/modules/exploits/unix/webapp/qtss_parse_xml_exec.rb +++ b/modules/exploits/unix/webapp/qtss_parse_xml_exec.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '10562'], diff --git a/modules/exploits/unix/webapp/redmine_scm_exec.rb b/modules/exploits/unix/webapp/redmine_scm_exec.rb index bf6cc7faab..aabc21e54f 100644 --- a/modules/exploits/unix/webapp/redmine_scm_exec.rb +++ b/modules/exploits/unix/webapp/redmine_scm_exec.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'joernchen ' ], #Phenoelit 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-4929'], diff --git a/modules/exploits/unix/webapp/sphpblog_file_upload.rb b/modules/exploits/unix/webapp/sphpblog_file_upload.rb index bd3326d2df..15f633be60 100644 --- a/modules/exploits/unix/webapp/sphpblog_file_upload.rb +++ b/modules/exploits/unix/webapp/sphpblog_file_upload.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Matteo Cantoni ', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2733'], diff --git a/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb b/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb index 90934f39e6..11f7fa5398 100644 --- a/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb +++ b/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote Only "cmd/unix/generic" payloads were tested. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Author' => [ 'Nicob ' ], 'References' => [ diff --git a/modules/exploits/unix/webapp/sugarcrm_unserialize_exec.rb b/modules/exploits/unix/webapp/sugarcrm_unserialize_exec.rb index 5362ed117f..bff07ae5d0 100644 --- a/modules/exploits/unix/webapp/sugarcrm_unserialize_exec.rb +++ b/modules/exploits/unix/webapp/sugarcrm_unserialize_exec.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'sinn3r' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-0694' ], diff --git a/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb b/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb index 6e3fbd1dad..50486cf5f9 100644 --- a/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb +++ b/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Matteo Cantoni ', 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-5423'], diff --git a/modules/exploits/unix/webapp/tikiwiki_jhot_exec.rb b/modules/exploits/unix/webapp/tikiwiki_jhot_exec.rb index 71810d242f..10d24721cf 100644 --- a/modules/exploits/unix/webapp/tikiwiki_jhot_exec.rb +++ b/modules/exploits/unix/webapp/tikiwiki_jhot_exec.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Matteo Cantoni ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-4602'], diff --git a/modules/exploits/unix/webapp/tikiwiki_unserialize_exec.rb b/modules/exploits/unix/webapp/tikiwiki_unserialize_exec.rb index c013b2ca94..5d097ed9fc 100644 --- a/modules/exploits/unix/webapp/tikiwiki_unserialize_exec.rb +++ b/modules/exploits/unix/webapp/tikiwiki_unserialize_exec.rb @@ -37,7 +37,6 @@ class Metasploit3 < Msf::Exploit::Remote 'juan vazquez' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-0911' ], diff --git a/modules/exploits/unix/webapp/trixbox_langchoice.rb b/modules/exploits/unix/webapp/trixbox_langchoice.rb index 4872b15483..339caadd9d 100644 --- a/modules/exploits/unix/webapp/trixbox_langchoice.rb +++ b/modules/exploits/unix/webapp/trixbox_langchoice.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => ['chao-mu'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB' => '50421'], diff --git a/modules/exploits/unix/webapp/twiki_history.rb b/modules/exploits/unix/webapp/twiki_history.rb index d38171ef53..9f3376e79f 100644 --- a/modules/exploits/unix/webapp/twiki_history.rb +++ b/modules/exploits/unix/webapp/twiki_history.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # metasploit version ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2877' ], diff --git a/modules/exploits/unix/webapp/twiki_search.rb b/modules/exploits/unix/webapp/twiki_search.rb index c6d60bf4cb..69b19fb733 100644 --- a/modules/exploits/unix/webapp/twiki_search.rb +++ b/modules/exploits/unix/webapp/twiki_search.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # metasploit version ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1037' ], diff --git a/modules/exploits/windows/antivirus/ams_hndlrsvc.rb b/modules/exploits/windows/antivirus/ams_hndlrsvc.rb index 95d53b3430..b468da6060 100644 --- a/modules/exploits/windows/antivirus/ams_hndlrsvc.rb +++ b/modules/exploits/windows/antivirus/ams_hndlrsvc.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '66807'], diff --git a/modules/exploits/windows/antivirus/ams_xfr.rb b/modules/exploits/windows/antivirus/ams_xfr.rb index 42683c28e5..4b1f341d5b 100644 --- a/modules/exploits/windows/antivirus/ams_xfr.rb +++ b/modules/exploits/windows/antivirus/ams_xfr.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1429' ], diff --git a/modules/exploits/windows/antivirus/symantec_iao.rb b/modules/exploits/windows/antivirus/symantec_iao.rb index 1caf46c418..31a6b13a7b 100644 --- a/modules/exploits/windows/antivirus/symantec_iao.rb +++ b/modules/exploits/windows/antivirus/symantec_iao.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1430' ], diff --git a/modules/exploits/windows/antivirus/symantec_rtvscan.rb b/modules/exploits/windows/antivirus/symantec_rtvscan.rb index bd2a799e40..6350c5759a 100644 --- a/modules/exploits/windows/antivirus/symantec_rtvscan.rb +++ b/modules/exploits/windows/antivirus/symantec_rtvscan.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-2630'], diff --git a/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb b/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb index d233e539c9..593072be82 100644 --- a/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb +++ b/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-1070'], diff --git a/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb b/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb index 918c245518..021f5aa047 100644 --- a/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb +++ b/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2508'], diff --git a/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb b/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb index 9a54108e21..1cd2ef2490 100644 --- a/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb +++ b/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2508'], diff --git a/modules/exploits/windows/arkeia/type77.rb b/modules/exploits/windows/arkeia/type77.rb index b7409de448..48a7a64b5c 100644 --- a/modules/exploits/windows/arkeia/type77.rb +++ b/modules/exploits/windows/arkeia/type77.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0491' ], diff --git a/modules/exploits/windows/backdoor/energizer_duo_payload.rb b/modules/exploits/windows/backdoor/energizer_duo_payload.rb index 313dff70eb..01148288a7 100644 --- a/modules/exploits/windows/backdoor/energizer_duo_payload.rb +++ b/modules/exploits/windows/backdoor/energizer_duo_payload.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-0103'], diff --git a/modules/exploits/windows/backupexec/name_service.rb b/modules/exploits/windows/backupexec/name_service.rb index 9e6d1a755a..0520de340a 100644 --- a/modules/exploits/windows/backupexec/name_service.rb +++ b/modules/exploits/windows/backupexec/name_service.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1172'], diff --git a/modules/exploits/windows/backupexec/remote_agent.rb b/modules/exploits/windows/backupexec/remote_agent.rb index 13e30385cd..405182ade8 100644 --- a/modules/exploits/windows/backupexec/remote_agent.rb +++ b/modules/exploits/windows/backupexec/remote_agent.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0773'], diff --git a/modules/exploits/windows/brightstor/ca_arcserve_342.rb b/modules/exploits/windows/brightstor/ca_arcserve_342.rb index c1584c6ad8..993e56130a 100644 --- a/modules/exploits/windows/brightstor/ca_arcserve_342.rb +++ b/modules/exploits/windows/brightstor/ca_arcserve_342.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Nahuel Cayento Riva', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '31684' ], diff --git a/modules/exploits/windows/brightstor/discovery_tcp.rb b/modules/exploits/windows/brightstor/discovery_tcp.rb index 8acb41a022..9b8bba9709 100644 --- a/modules/exploits/windows/brightstor/discovery_tcp.rb +++ b/modules/exploits/windows/brightstor/discovery_tcp.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2535'], diff --git a/modules/exploits/windows/brightstor/discovery_udp.rb b/modules/exploits/windows/brightstor/discovery_udp.rb index c8e5aee98c..e5a45e6e64 100644 --- a/modules/exploits/windows/brightstor/discovery_udp.rb +++ b/modules/exploits/windows/brightstor/discovery_udp.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0260'], diff --git a/modules/exploits/windows/brightstor/etrust_itm_alert.rb b/modules/exploits/windows/brightstor/etrust_itm_alert.rb index 207154ad86..b48371a935 100644 --- a/modules/exploits/windows/brightstor/etrust_itm_alert.rb +++ b/modules/exploits/windows/brightstor/etrust_itm_alert.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4620' ], diff --git a/modules/exploits/windows/brightstor/hsmserver.rb b/modules/exploits/windows/brightstor/hsmserver.rb index b43e19fd21..b113812af7 100644 --- a/modules/exploits/windows/brightstor/hsmserver.rb +++ b/modules/exploits/windows/brightstor/hsmserver.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'toto' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5082' ], diff --git a/modules/exploits/windows/brightstor/lgserver.rb b/modules/exploits/windows/brightstor/lgserver.rb index 8407deae6e..1cc2a009b7 100644 --- a/modules/exploits/windows/brightstor/lgserver.rb +++ b/modules/exploits/windows/brightstor/lgserver.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-0449' ], diff --git a/modules/exploits/windows/brightstor/lgserver_multi.rb b/modules/exploits/windows/brightstor/lgserver_multi.rb index 9003326a36..2a2d6f4651 100644 --- a/modules/exploits/windows/brightstor/lgserver_multi.rb +++ b/modules/exploits/windows/brightstor/lgserver_multi.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3216' ], diff --git a/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb b/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb index e3bef411f2..a66fdb35f4 100644 --- a/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb +++ b/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5003' ], diff --git a/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb b/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb index 330dfa95d2..eecdb65582 100644 --- a/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb +++ b/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3216' ], diff --git a/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb b/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb index a15b01dfd8..f99e6a6d59 100644 --- a/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb +++ b/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3216' ], diff --git a/modules/exploits/windows/brightstor/license_gcr.rb b/modules/exploits/windows/brightstor/license_gcr.rb index 89500ddb8a..f4d5354288 100644 --- a/modules/exploits/windows/brightstor/license_gcr.rb +++ b/modules/exploits/windows/brightstor/license_gcr.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0581' ], diff --git a/modules/exploits/windows/brightstor/mediasrv_sunrpc.rb b/modules/exploits/windows/brightstor/mediasrv_sunrpc.rb index 757bc198f3..0c40d63f7e 100644 --- a/modules/exploits/windows/brightstor/mediasrv_sunrpc.rb +++ b/modules/exploits/windows/brightstor/mediasrv_sunrpc.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'toto' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2139'], diff --git a/modules/exploits/windows/brightstor/message_engine.rb b/modules/exploits/windows/brightstor/message_engine.rb index 9a7fc590b6..c40077e978 100644 --- a/modules/exploits/windows/brightstor/message_engine.rb +++ b/modules/exploits/windows/brightstor/message_engine.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-0169' ], diff --git a/modules/exploits/windows/brightstor/message_engine_72.rb b/modules/exploits/windows/brightstor/message_engine_72.rb index 6e48f213e7..fc334f1506 100644 --- a/modules/exploits/windows/brightstor/message_engine_72.rb +++ b/modules/exploits/windows/brightstor/message_engine_72.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '68329'], diff --git a/modules/exploits/windows/brightstor/message_engine_heap.rb b/modules/exploits/windows/brightstor/message_engine_heap.rb index 997ee716a2..42237b3b53 100644 --- a/modules/exploits/windows/brightstor/message_engine_heap.rb +++ b/modules/exploits/windows/brightstor/message_engine_heap.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5143' ], diff --git a/modules/exploits/windows/brightstor/sql_agent.rb b/modules/exploits/windows/brightstor/sql_agent.rb index 6b718f9d87..8e6045e348 100644 --- a/modules/exploits/windows/brightstor/sql_agent.rb +++ b/modules/exploits/windows/brightstor/sql_agent.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-1272'], diff --git a/modules/exploits/windows/brightstor/tape_engine.rb b/modules/exploits/windows/brightstor/tape_engine.rb index 18a9a5a91b..59082d36ed 100644 --- a/modules/exploits/windows/brightstor/tape_engine.rb +++ b/modules/exploits/windows/brightstor/tape_engine.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6076' ], diff --git a/modules/exploits/windows/brightstor/tape_engine_8A.rb b/modules/exploits/windows/brightstor/tape_engine_8A.rb index 0ff6f778f1..83583db75e 100644 --- a/modules/exploits/windows/brightstor/tape_engine_8A.rb +++ b/modules/exploits/windows/brightstor/tape_engine_8A.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '68330'], diff --git a/modules/exploits/windows/brightstor/universal_agent.rb b/modules/exploits/windows/brightstor/universal_agent.rb index 4e23df13a7..6defe3125b 100644 --- a/modules/exploits/windows/brightstor/universal_agent.rb +++ b/modules/exploits/windows/brightstor/universal_agent.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-1018'], diff --git a/modules/exploits/windows/browser/adobe_cooltype_sing.rb b/modules/exploits/windows/browser/adobe_cooltype_sing.rb index 32f8cc6f85..0a64ebeae4 100644 --- a/modules/exploits/windows/browser/adobe_cooltype_sing.rb +++ b/modules/exploits/windows/browser/adobe_cooltype_sing.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote '@vicheck', # initial analysis 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2883' ], diff --git a/modules/exploits/windows/browser/adobe_flashplayer_arrayindexing.rb b/modules/exploits/windows/browser/adobe_flashplayer_arrayindexing.rb index 687daf9566..eb574e2257 100644 --- a/modules/exploits/windows/browser/adobe_flashplayer_arrayindexing.rb +++ b/modules/exploits/windows/browser/adobe_flashplayer_arrayindexing.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # msf exploit 'Unknown' # malware version seen used in targeted attacks ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-2110'], diff --git a/modules/exploits/windows/browser/adobe_flashplayer_avm.rb b/modules/exploits/windows/browser/adobe_flashplayer_avm.rb index 7bd33b3e22..32e39faa92 100644 --- a/modules/exploits/windows/browser/adobe_flashplayer_avm.rb +++ b/modules/exploits/windows/browser/adobe_flashplayer_avm.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'bannedit', # Metasploit version, 'Unknown' # Malcode version seen used in targeted attacks ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-0609'], diff --git a/modules/exploits/windows/browser/adobe_flashplayer_flash10o.rb b/modules/exploits/windows/browser/adobe_flashplayer_flash10o.rb index 085c67a70d..b8e973af38 100644 --- a/modules/exploits/windows/browser/adobe_flashplayer_flash10o.rb +++ b/modules/exploits/windows/browser/adobe_flashplayer_flash10o.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote victim machine in order to work properly. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'sinn3r', diff --git a/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb b/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb index 48ce661fa4..c1c6dc6ed2 100644 --- a/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb +++ b/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Unknown', # Found being openly exploited 'jduck' # Metasploit version ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-1297'], diff --git a/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb b/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb index 70962791ec..e315a25410 100644 --- a/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb +++ b/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck', 'jabra' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3459' ], diff --git a/modules/exploits/windows/browser/adobe_geticon.rb b/modules/exploits/windows/browser/adobe_geticon.rb index ec47b1eff2..bf2d510125 100644 --- a/modules/exploits/windows/browser/adobe_geticon.rb +++ b/modules/exploits/windows/browser/adobe_geticon.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Didier Stevens ', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0927' ], diff --git a/modules/exploits/windows/browser/adobe_jbig2decode.rb b/modules/exploits/windows/browser/adobe_jbig2decode.rb index 69fb060fc6..f6e2e55e2a 100644 --- a/modules/exploits/windows/browser/adobe_jbig2decode.rb +++ b/modules/exploits/windows/browser/adobe_jbig2decode.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote # obfuscation techniques and pdf template from util_printf 'MC', 'Didier Stevens ', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE' , '2009-0658' ], diff --git a/modules/exploits/windows/browser/adobe_media_newplayer.rb b/modules/exploits/windows/browser/adobe_media_newplayer.rb index 9ee1cebf3a..fa9206a9ea 100644 --- a/modules/exploits/windows/browser/adobe_media_newplayer.rb +++ b/modules/exploits/windows/browser/adobe_media_newplayer.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck', 'jabra' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4324' ], diff --git a/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb b/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb index bb824738ad..0dcce3dac8 100644 --- a/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb +++ b/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'David Kennedy "ReL1K" '], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3653'], diff --git a/modules/exploits/windows/browser/adobe_utilprintf.rb b/modules/exploits/windows/browser/adobe_utilprintf.rb index 4d449d4c4f..daa246977f 100644 --- a/modules/exploits/windows/browser/adobe_utilprintf.rb +++ b/modules/exploits/windows/browser/adobe_utilprintf.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC', 'Didier Stevens ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2992' ], diff --git a/modules/exploits/windows/browser/aim_goaway.rb b/modules/exploits/windows/browser/aim_goaway.rb index 32c72af9fc..e71d8ed0ac 100644 --- a/modules/exploits/windows/browser/aim_goaway.rb +++ b/modules/exploits/windows/browser/aim_goaway.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'skape', 'thief ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0636' ], diff --git a/modules/exploits/windows/browser/amaya_bdo.rb b/modules/exploits/windows/browser/amaya_bdo.rb index 101f00b3d8..86657c7b90 100644 --- a/modules/exploits/windows/browser/amaya_bdo.rb +++ b/modules/exploits/windows/browser/amaya_bdo.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'dookie, original exploit by Rob Carter' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0323' ], diff --git a/modules/exploits/windows/browser/aol_ampx_convertfile.rb b/modules/exploits/windows/browser/aol_ampx_convertfile.rb index 8515f2d696..9c37381e18 100644 --- a/modules/exploits/windows/browser/aol_ampx_convertfile.rb +++ b/modules/exploits/windows/browser/aol_ampx_convertfile.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'rgod ', # Original exploit [see References] 'Trancer ' # Metasploit implementation ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '54706' ], diff --git a/modules/exploits/windows/browser/aol_icq_downloadagent.rb b/modules/exploits/windows/browser/aol_icq_downloadagent.rb index 9cb78c5f1e..d6fa08af19 100644 --- a/modules/exploits/windows/browser/aol_icq_downloadagent.rb +++ b/modules/exploits/windows/browser/aol_icq_downloadagent.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5650' ], diff --git a/modules/exploits/windows/browser/apple_itunes_playlist.rb b/modules/exploits/windows/browser/apple_itunes_playlist.rb index f06381c84f..52a2ab5487 100644 --- a/modules/exploits/windows/browser/apple_itunes_playlist.rb +++ b/modules/exploits/windows/browser/apple_itunes_playlist.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0043' ], diff --git a/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb b/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb index 2ad21d750c..04ac60ecae 100644 --- a/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb +++ b/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1818' ], diff --git a/modules/exploits/windows/browser/apple_quicktime_rtsp.rb b/modules/exploits/windows/browser/apple_quicktime_rtsp.rb index 93d87ac6ef..ecaae6bbc7 100644 --- a/modules/exploits/windows/browser/apple_quicktime_rtsp.rb +++ b/modules/exploits/windows/browser/apple_quicktime_rtsp.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'egypt' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-0015' ], diff --git a/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb b/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb index 2391b36c69..6ac63df452 100644 --- a/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb +++ b/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1799' ], diff --git a/modules/exploits/windows/browser/ask_shortformat.rb b/modules/exploits/windows/browser/ask_shortformat.rb index 779e2e7939..a993cd2897 100644 --- a/modules/exploits/windows/browser/ask_shortformat.rb +++ b/modules/exploits/windows/browser/ask_shortformat.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5107' ], diff --git a/modules/exploits/windows/browser/athocgov_completeinstallation.rb b/modules/exploits/windows/browser/athocgov_completeinstallation.rb index 7b2a1b5d2a..f673b54b77 100644 --- a/modules/exploits/windows/browser/athocgov_completeinstallation.rb +++ b/modules/exploits/windows/browser/athocgov_completeinstallation.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.athoc.com/products/IWSAlerts_overview.aspx' ] diff --git a/modules/exploits/windows/browser/autodesk_idrop.rb b/modules/exploits/windows/browser/autodesk_idrop.rb index 046ac53bf7..fb13f49e1a 100644 --- a/modules/exploits/windows/browser/autodesk_idrop.rb +++ b/modules/exploits/windows/browser/autodesk_idrop.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Elazar Broad ', # Original exploit [see References] 'Trancer ' # Metasploit implementation ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '53265' ], diff --git a/modules/exploits/windows/browser/aventail_epi_activex.rb b/modules/exploits/windows/browser/aventail_epi_activex.rb index 2ef4ac8eff..8dd1dfc20f 100644 --- a/modules/exploits/windows/browser/aventail_epi_activex.rb +++ b/modules/exploits/windows/browser/aventail_epi_activex.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Nikolas Sotiriu', # original discovery / poc 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '67286'], diff --git a/modules/exploits/windows/browser/awingsoft_web3d_bof.rb b/modules/exploits/windows/browser/awingsoft_web3d_bof.rb index 343c589a1b..edf70d1c0c 100644 --- a/modules/exploits/windows/browser/awingsoft_web3d_bof.rb +++ b/modules/exploits/windows/browser/awingsoft_web3d_bof.rb @@ -47,7 +47,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Trancer ', # Metasploit implementation 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4588' ], diff --git a/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb b/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb index d20a6e0264..85fdfe7daa 100644 --- a/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb +++ b/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'jduck' # original discovery & metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4850' ], diff --git a/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb b/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb index dd7de45cdc..f9d0ae766f 100644 --- a/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb +++ b/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1612' ], diff --git a/modules/exploits/windows/browser/barcode_ax49.rb b/modules/exploits/windows/browser/barcode_ax49.rb index 372c2c9822..cc332720bc 100644 --- a/modules/exploits/windows/browser/barcode_ax49.rb +++ b/modules/exploits/windows/browser/barcode_ax49.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancek ', 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'EDB', '4094' ], diff --git a/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb b/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb index 8ca88ff4f5..2954843631 100644 --- a/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb +++ b/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # msf 'sinn3r' # wbemexec tekniq ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2683'], diff --git a/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb b/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb index 9f74970785..0b1776245e 100644 --- a/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb +++ b/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'dean ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1472' ], diff --git a/modules/exploits/windows/browser/chilkat_crypt_writefile.rb b/modules/exploits/windows/browser/chilkat_crypt_writefile.rb index 641ac6819f..4850b59b1a 100644 --- a/modules/exploits/windows/browser/chilkat_crypt_writefile.rb +++ b/modules/exploits/windows/browser/chilkat_crypt_writefile.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'shinnai', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5002' ], diff --git a/modules/exploits/windows/browser/cisco_anyconnect_exec.rb b/modules/exploits/windows/browser/cisco_anyconnect_exec.rb index ba225b2f78..7c9a5b2f8b 100644 --- a/modules/exploits/windows/browser/cisco_anyconnect_exec.rb +++ b/modules/exploits/windows/browser/cisco_anyconnect_exec.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'bannedit' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-2039' ], diff --git a/modules/exploits/windows/browser/citrix_gateway_actx.rb b/modules/exploits/windows/browser/citrix_gateway_actx.rb index d3019a0eb4..68d0d03894 100644 --- a/modules/exploits/windows/browser/citrix_gateway_actx.rb +++ b/modules/exploits/windows/browser/citrix_gateway_actx.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'bannedit', 'sinn3r', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-2882'], diff --git a/modules/exploits/windows/browser/communicrypt_mail_activex.rb b/modules/exploits/windows/browser/communicrypt_mail_activex.rb index a2a2e35ff8..5ca97d58be 100644 --- a/modules/exploits/windows/browser/communicrypt_mail_activex.rb +++ b/modules/exploits/windows/browser/communicrypt_mail_activex.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Lincoln', # Original exploit author 'dookie' # MSF module author ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64839' ], diff --git a/modules/exploits/windows/browser/creative_software_cachefolder.rb b/modules/exploits/windows/browser/creative_software_cachefolder.rb index 576a2bd903..e83953ea9c 100644 --- a/modules/exploits/windows/browser/creative_software_cachefolder.rb +++ b/modules/exploits/windows/browser/creative_software_cachefolder.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0955' ], diff --git a/modules/exploits/windows/browser/dxstudio_player_exec.rb b/modules/exploits/windows/browser/dxstudio_player_exec.rb index fa4f4dda5c..b7803aa617 100644 --- a/modules/exploits/windows/browser/dxstudio_player_exec.rb +++ b/modules/exploits/windows/browser/dxstudio_player_exec.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2011' ], diff --git a/modules/exploits/windows/browser/ea_checkrequirements.rb b/modules/exploits/windows/browser/ea_checkrequirements.rb index fec5e92f4f..d5688a3fb7 100644 --- a/modules/exploits/windows/browser/ea_checkrequirements.rb +++ b/modules/exploits/windows/browser/ea_checkrequirements.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4466' ], diff --git a/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb b/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb index 849fed95a4..3d1431c534 100644 --- a/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb +++ b/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => BSD_LICENSE, 'Author' => [ 'LSO ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2919' ], diff --git a/modules/exploits/windows/browser/enjoysapgui_comp_download.rb b/modules/exploits/windows/browser/enjoysapgui_comp_download.rb index 72d228d091..3ab60922af 100644 --- a/modules/exploits/windows/browser/enjoysapgui_comp_download.rb +++ b/modules/exploits/windows/browser/enjoysapgui_comp_download.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4830'], diff --git a/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb b/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb index 84d078e673..1a085cd4c3 100644 --- a/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb +++ b/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3605' ], diff --git a/modules/exploits/windows/browser/facebook_extractiptc.rb b/modules/exploits/windows/browser/facebook_extractiptc.rb index e8153ede4f..810c2b64c8 100644 --- a/modules/exploits/windows/browser/facebook_extractiptc.rb +++ b/modules/exploits/windows/browser/facebook_extractiptc.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5711' ], diff --git a/modules/exploits/windows/browser/gom_openurl.rb b/modules/exploits/windows/browser/gom_openurl.rb index e79390caac..4cf734417d 100644 --- a/modules/exploits/windows/browser/gom_openurl.rb +++ b/modules/exploits/windows/browser/gom_openurl.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5779'], diff --git a/modules/exploits/windows/browser/greendam_url.rb b/modules/exploits/windows/browser/greendam_url.rb index 92266b0c86..688e4c8eca 100644 --- a/modules/exploits/windows/browser/greendam_url.rb +++ b/modules/exploits/windows/browser/greendam_url.rb @@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '55126'], diff --git a/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb b/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb index 8801c94e12..eede7ff55b 100644 --- a/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb +++ b/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Andrea Micalizzi', # aka rgod original discovery 'juan vazquez', # Original Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-2404'], diff --git a/modules/exploits/windows/browser/hp_loadrunner_addfile.rb b/modules/exploits/windows/browser/hp_loadrunner_addfile.rb index 3e03f5f35a..7322dada72 100644 --- a/modules/exploits/windows/browser/hp_loadrunner_addfile.rb +++ b/modules/exploits/windows/browser/hp_loadrunner_addfile.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0492'], diff --git a/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb b/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb index 29b6f669e4..c1fcd4c6d7 100644 --- a/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb +++ b/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-6530'], diff --git a/modules/exploits/windows/browser/hpmqc_progcolor.rb b/modules/exploits/windows/browser/hpmqc_progcolor.rb index f159e3c78f..fdc32cd2fc 100644 --- a/modules/exploits/windows/browser/hpmqc_progcolor.rb +++ b/modules/exploits/windows/browser/hpmqc_progcolor.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1819' ], diff --git a/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb b/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb index 0ee008d78a..2662c74205 100644 --- a/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb +++ b/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Dz_attacker ', # original file format module 'jduck' # converted HttpServer module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0679' ], diff --git a/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb b/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb index 80df38008f..53e8633822 100644 --- a/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb +++ b/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb @@ -22,8 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', - 'References' => [ [ 'CVE', '2009-0215' ], diff --git a/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb b/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb index 652467ca1b..03be2c5721 100644 --- a/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb +++ b/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Elazar Broad ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4474' ], diff --git a/modules/exploits/windows/browser/ie_createobject.rb b/modules/exploits/windows/browser/ie_createobject.rb index be9664c5cb..cb58cedabe 100644 --- a/modules/exploits/windows/browser/ie_createobject.rb +++ b/modules/exploits/windows/browser/ie_createobject.rb @@ -58,7 +58,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'hdm', ], - 'Version' => '$Revision$', 'References' => [ # MDAC diff --git a/modules/exploits/windows/browser/ie_iscomponentinstalled.rb b/modules/exploits/windows/browser/ie_iscomponentinstalled.rb index 1188c4f098..2a880988ae 100644 --- a/modules/exploits/windows/browser/ie_iscomponentinstalled.rb +++ b/modules/exploits/windows/browser/ie_iscomponentinstalled.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'hdm', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-1016' ], diff --git a/modules/exploits/windows/browser/ie_unsafe_scripting.rb b/modules/exploits/windows/browser/ie_unsafe_scripting.rb index 5379280157..4cc70f581d 100644 --- a/modules/exploits/windows/browser/ie_unsafe_scripting.rb +++ b/modules/exploits/windows/browser/ie_unsafe_scripting.rb @@ -41,7 +41,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'natron' ], - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://support.microsoft.com/kb/182569' ], diff --git a/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb b/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb index 889adda256..d4149ea286 100644 --- a/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb +++ b/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'TecR0c ', # Metasploit module 'mr_me ' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'EDB', '15668' ], diff --git a/modules/exploits/windows/browser/java_basicservice_impl.rb b/modules/exploits/windows/browser/java_basicservice_impl.rb index fa61f32270..3202d3ca3e 100644 --- a/modules/exploits/windows/browser/java_basicservice_impl.rb +++ b/modules/exploits/windows/browser/java_basicservice_impl.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Matthias Kaiser', # Discovery, PoC, metasploit module 'egypt' # metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3563' ], diff --git a/modules/exploits/windows/browser/java_codebase_trust.rb b/modules/exploits/windows/browser/java_codebase_trust.rb index 512737ac2b..5eb12066b4 100644 --- a/modules/exploits/windows/browser/java_codebase_trust.rb +++ b/modules/exploits/windows/browser/java_codebase_trust.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Frederic Hoguin', # Discovery, PoC 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-4452' ], diff --git a/modules/exploits/windows/browser/java_docbase_bof.rb b/modules/exploits/windows/browser/java_docbase_bof.rb index 8b9024f0b0..0dd7ef6401 100644 --- a/modules/exploits/windows/browser/java_docbase_bof.rb +++ b/modules/exploits/windows/browser/java_docbase_bof.rb @@ -45,7 +45,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'jduck', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3552' ], diff --git a/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb b/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb index f1e9f5e00e..05551f796a 100644 --- a/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb +++ b/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb @@ -37,7 +37,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'jduck', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0886' ], diff --git a/modules/exploits/windows/browser/java_ws_vmargs.rb b/modules/exploits/windows/browser/java_ws_vmargs.rb index 80d8d2827f..105bc4dca4 100644 --- a/modules/exploits/windows/browser/java_ws_vmargs.rb +++ b/modules/exploits/windows/browser/java_ws_vmargs.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'jduck', # Bug reported to Oracle by TELUS - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-0500' ], diff --git a/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb b/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb index cd2c9b211e..89ef3ca46b 100644 --- a/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb +++ b/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'patrick', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2086' ], diff --git a/modules/exploits/windows/browser/kazaa_altnet_heap.rb b/modules/exploits/windows/browser/kazaa_altnet_heap.rb index 9faf8d98e2..5445a69191 100644 --- a/modules/exploits/windows/browser/kazaa_altnet_heap.rb +++ b/modules/exploits/windows/browser/kazaa_altnet_heap.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5217' ], diff --git a/modules/exploits/windows/browser/logitechvideocall_start.rb b/modules/exploits/windows/browser/logitechvideocall_start.rb index 574b911edf..7a43372ec8 100644 --- a/modules/exploits/windows/browser/logitechvideocall_start.rb +++ b/modules/exploits/windows/browser/logitechvideocall_start.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2918' ], diff --git a/modules/exploits/windows/browser/lpviewer_url.rb b/modules/exploits/windows/browser/lpviewer_url.rb index d31eec99d1..fd28bef942 100644 --- a/modules/exploits/windows/browser/lpviewer_url.rb +++ b/modules/exploits/windows/browser/lpviewer_url.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4384' ], diff --git a/modules/exploits/windows/browser/macrovision_downloadandexecute.rb b/modules/exploits/windows/browser/macrovision_downloadandexecute.rb index 217644a1fb..a66a68e35f 100644 --- a/modules/exploits/windows/browser/macrovision_downloadandexecute.rb +++ b/modules/exploits/windows/browser/macrovision_downloadandexecute.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5660' ], diff --git a/modules/exploits/windows/browser/macrovision_unsafe.rb b/modules/exploits/windows/browser/macrovision_unsafe.rb index a7eaf63953..c9b4c747fb 100644 --- a/modules/exploits/windows/browser/macrovision_unsafe.rb +++ b/modules/exploits/windows/browser/macrovision_unsafe.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5660' ], diff --git a/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb b/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb index 3e911ebc58..f7b28c1be2 100644 --- a/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb +++ b/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'skape', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-3961'], diff --git a/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb b/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb index 2020a8bbc0..a9344df519 100644 --- a/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb +++ b/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6707'], diff --git a/modules/exploits/windows/browser/mirc_irc_url.rb b/modules/exploits/windows/browser/mirc_irc_url.rb index c31c369193..2536010624 100644 --- a/modules/exploits/windows/browser/mirc_irc_url.rb +++ b/modules/exploits/windows/browser/mirc_irc_url.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-1336'], diff --git a/modules/exploits/windows/browser/mozilla_interleaved_write.rb b/modules/exploits/windows/browser/mozilla_interleaved_write.rb index d04db87275..2147fb915b 100644 --- a/modules/exploits/windows/browser/mozilla_interleaved_write.rb +++ b/modules/exploits/windows/browser/mozilla_interleaved_write.rb @@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote 'unknown', # discovered in the wild 'scriptjunkie' # Metasploit module, functionality/portability fixes ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-3765'], diff --git a/modules/exploits/windows/browser/mozilla_mchannel.rb b/modules/exploits/windows/browser/mozilla_mchannel.rb index 180f6311fe..498c89a6c8 100644 --- a/modules/exploits/windows/browser/mozilla_mchannel.rb +++ b/modules/exploits/windows/browser/mozilla_mchannel.rb @@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Rh0', # metasploit module 'mr_me ' # win7 target ], - 'Version' => "$Revision$", 'References' => [ ['CVE', '2011-0065'], diff --git a/modules/exploits/windows/browser/mozilla_nstreerange.rb b/modules/exploits/windows/browser/mozilla_nstreerange.rb index 8cb1b15f2a..2ec74be8f6 100644 --- a/modules/exploits/windows/browser/mozilla_nstreerange.rb +++ b/modules/exploits/windows/browser/mozilla_nstreerange.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'regenrecht', # discovered and sold to ZDI 'xero', # Shenanigans ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-0073'], diff --git a/modules/exploits/windows/browser/mozilla_reduceright.rb b/modules/exploits/windows/browser/mozilla_reduceright.rb index 3c39e6c1cd..a42e0842c7 100644 --- a/modules/exploits/windows/browser/mozilla_reduceright.rb +++ b/modules/exploits/windows/browser/mozilla_reduceright.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote typical browser exploit) in order to gain control of the machine. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Chris Rohlf', #Matasano Security (Initial discovery according to Mozilla.org) diff --git a/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb b/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb index 2ee98f2602..064d091981 100644 --- a/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb +++ b/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'skape', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0344' ], diff --git a/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb b/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb index fd64d0cd68..aadec4f7b0 100644 --- a/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb +++ b/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'san ', 'O600KO78RUS@unknown.ru', ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-4560'], diff --git a/modules/exploits/windows/browser/ms06_013_createtextrange.rb b/modules/exploits/windows/browser/ms06_013_createtextrange.rb index fcfcfb0951..78f17ae2fd 100644 --- a/modules/exploits/windows/browser/ms06_013_createtextrange.rb +++ b/modules/exploits/windows/browser/ms06_013_createtextrange.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote '', 'Unknown', ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-1359'], diff --git a/modules/exploits/windows/browser/ms06_055_vml_method.rb b/modules/exploits/windows/browser/ms06_055_vml_method.rb index 22efce39c9..3ed3ebaaa7 100644 --- a/modules/exploits/windows/browser/ms06_055_vml_method.rb +++ b/modules/exploits/windows/browser/ms06_055_vml_method.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Mr.Niega ', 'M. Shirk ' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-4868' ], diff --git a/modules/exploits/windows/browser/ms06_057_webview_setslice.rb b/modules/exploits/windows/browser/ms06_057_webview_setslice.rb index a3b25d2407..b911b49b65 100644 --- a/modules/exploits/windows/browser/ms06_057_webview_setslice.rb +++ b/modules/exploits/windows/browser/ms06_057_webview_setslice.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'hdm', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-3730'], diff --git a/modules/exploits/windows/browser/ms06_067_keyframe.rb b/modules/exploits/windows/browser/ms06_067_keyframe.rb index 73886aea0a..596c36d49b 100644 --- a/modules/exploits/windows/browser/ms06_067_keyframe.rb +++ b/modules/exploits/windows/browser/ms06_067_keyframe.rb @@ -46,7 +46,6 @@ class Metasploit3 < Msf::Exploit::Remote # Integrated into msf 'skape', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-4777' ], diff --git a/modules/exploits/windows/browser/ms06_071_xml_core.rb b/modules/exploits/windows/browser/ms06_071_xml_core.rb index 1696b99e89..3a5dcaf8bc 100644 --- a/modules/exploits/windows/browser/ms06_071_xml_core.rb +++ b/modules/exploits/windows/browser/ms06_071_xml_core.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Trirat Puttaraksa ', ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-5745' ], diff --git a/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb b/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb index 86ec169f89..6a517987dd 100644 --- a/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb +++ b/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Solar Eclipse ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-0038'], diff --git a/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb b/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb index 9bccf2ce06..442c6bff5b 100644 --- a/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb +++ b/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2463' ], diff --git a/modules/exploits/windows/browser/ms08_053_mediaencoder.rb b/modules/exploits/windows/browser/ms08_053_mediaencoder.rb index cd5b11c3b9..6454af7d66 100644 --- a/modules/exploits/windows/browser/ms08_053_mediaencoder.rb +++ b/modules/exploits/windows/browser/ms08_053_mediaencoder.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3008' ], diff --git a/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb b/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb index b53607078b..c99285fae3 100644 --- a/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb +++ b/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'koshi', 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3704' ], diff --git a/modules/exploits/windows/browser/ms08_078_xml_corruption.rb b/modules/exploits/windows/browser/ms08_078_xml_corruption.rb index c6e25875ab..01d1d56384 100644 --- a/modules/exploits/windows/browser/ms08_078_xml_corruption.rb +++ b/modules/exploits/windows/browser/ms08_078_xml_corruption.rb @@ -41,7 +41,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'hdm' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-4844'], diff --git a/modules/exploits/windows/browser/ms09_002_memory_corruption.rb b/modules/exploits/windows/browser/ms09_002_memory_corruption.rb index 659215e8ff..29b66701d9 100644 --- a/modules/exploits/windows/browser/ms09_002_memory_corruption.rb +++ b/modules/exploits/windows/browser/ms09_002_memory_corruption.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'dean [at] zerodaysolutions [dot] com' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0075' ], diff --git a/modules/exploits/windows/browser/ms09_043_owc_htmlurl.rb b/modules/exploits/windows/browser/ms09_043_owc_htmlurl.rb index cb1b3b072f..0aa165ea7b 100644 --- a/modules/exploits/windows/browser/ms09_043_owc_htmlurl.rb +++ b/modules/exploits/windows/browser/ms09_043_owc_htmlurl.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1534' ], diff --git a/modules/exploits/windows/browser/ms09_043_owc_msdso.rb b/modules/exploits/windows/browser/ms09_043_owc_msdso.rb index b7721d9759..92a3573463 100644 --- a/modules/exploits/windows/browser/ms09_043_owc_msdso.rb +++ b/modules/exploits/windows/browser/ms09_043_owc_msdso.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'unknown', 'hdm', 'Ahmed Obied', 'DSR! ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1136' ], diff --git a/modules/exploits/windows/browser/ms09_072_style_object.rb b/modules/exploits/windows/browser/ms09_072_style_object.rb index 95578b2ab0..9c925c5d32 100644 --- a/modules/exploits/windows/browser/ms09_072_style_object.rb +++ b/modules/exploits/windows/browser/ms09_072_style_object.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote 'securitylab.ir ', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ ['MSB', 'MS09-072'], diff --git a/modules/exploits/windows/browser/ms10_002_aurora.rb b/modules/exploits/windows/browser/ms10_002_aurora.rb index e2aaa14a67..0a345a517c 100644 --- a/modules/exploits/windows/browser/ms10_002_aurora.rb +++ b/modules/exploits/windows/browser/ms10_002_aurora.rb @@ -41,7 +41,6 @@ class Metasploit3 < Msf::Exploit::Remote 'unknown', 'hdm' # Metasploit port ], - 'Version' => '$Revision$', 'References' => [ ['MSB', 'MS10-002'], diff --git a/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb b/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb index c830294d00..773f87a04b 100644 --- a/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb +++ b/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb @@ -69,7 +69,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Nanika', # HIT2010 IE7 reliable PoC 'jduck' # minor cleanups ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0806' ], diff --git a/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb b/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb index 7609fa7da6..c5b15dc774 100644 --- a/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb +++ b/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Unknown', # original discovery 'jduck' # metasploit version ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0805' ], diff --git a/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb b/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb index e1b428c919..1b0613c12c 100644 --- a/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb +++ b/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit version ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0483' ], diff --git a/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb b/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb index 50f3f92b38..4cc5458e55 100644 --- a/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb +++ b/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Jordi Sanchez ', # Metasploit module - Help ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-0480'], diff --git a/modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb b/modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb index aaae2367ad..b96b8bc8cb 100644 --- a/modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb +++ b/modules/exploits/windows/browser/ms10_042_helpctr_xss_cmd_exec.rb @@ -44,7 +44,6 @@ class Metasploit3 < Msf::Exploit::Remote 'natron' # Metasploit version ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1885' ], diff --git a/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb b/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb index 2eaa8e922a..f424617772 100644 --- a/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb +++ b/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'B_H' # Clean LNK template ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-2568'], diff --git a/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb b/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb index 0aeaac5fe0..cee5f962a6 100644 --- a/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb +++ b/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb @@ -53,7 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Matteo Memelli', # exploit-db version 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3962' ], diff --git a/modules/exploits/windows/browser/ms11_003_ie_css_import.rb b/modules/exploits/windows/browser/ms11_003_ie_css_import.rb index 8306a557d3..f255c00450 100644 --- a/modules/exploits/windows/browser/ms11_003_ie_css_import.rb +++ b/modules/exploits/windows/browser/ms11_003_ie_css_import.rb @@ -44,7 +44,6 @@ class Metasploit3 < Msf::Exploit::Remote 'd0c_s4vage', # First working public exploit 'jduck' # Metasploit module (ROP, @WTFuzz spray) ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3971' ], diff --git a/modules/exploits/windows/browser/msvidctl_mpeg2.rb b/modules/exploits/windows/browser/msvidctl_mpeg2.rb index 750524f7ff..38d3585e30 100644 --- a/modules/exploits/windows/browser/msvidctl_mpeg2.rb +++ b/modules/exploits/windows/browser/msvidctl_mpeg2.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0015' ], diff --git a/modules/exploits/windows/browser/mswhale_checkforupdates.rb b/modules/exploits/windows/browser/mswhale_checkforupdates.rb index 17ee1d1d24..ce81cea30f 100644 --- a/modules/exploits/windows/browser/mswhale_checkforupdates.rb +++ b/modules/exploits/windows/browser/mswhale_checkforupdates.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2238' ], diff --git a/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb b/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb index ed2060f8e4..2fd2977c36 100644 --- a/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb +++ b/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC', 'dookie', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-0018' ], diff --git a/modules/exploits/windows/browser/nis2004_antispam.rb b/modules/exploits/windows/browser/nis2004_antispam.rb index cd162f9325..baca22059e 100644 --- a/modules/exploits/windows/browser/nis2004_antispam.rb +++ b/modules/exploits/windows/browser/nis2004_antispam.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0363' ], diff --git a/modules/exploits/windows/browser/nis2004_get.rb b/modules/exploits/windows/browser/nis2004_get.rb index 68028d95db..99468bd8f9 100644 --- a/modules/exploits/windows/browser/nis2004_get.rb +++ b/modules/exploits/windows/browser/nis2004_get.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1689' ], diff --git a/modules/exploits/windows/browser/novelliprint_callbackurl.rb b/modules/exploits/windows/browser/novelliprint_callbackurl.rb index 2ac1dd3149..3dfb53c342 100644 --- a/modules/exploits/windows/browser/novelliprint_callbackurl.rb +++ b/modules/exploits/windows/browser/novelliprint_callbackurl.rb @@ -52,7 +52,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1527' ], diff --git a/modules/exploits/windows/browser/novelliprint_datetime.rb b/modules/exploits/windows/browser/novelliprint_datetime.rb index 830ab82a1c..6f02766bd3 100644 --- a/modules/exploits/windows/browser/novelliprint_datetime.rb +++ b/modules/exploits/windows/browser/novelliprint_datetime.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1569' ], diff --git a/modules/exploits/windows/browser/novelliprint_executerequest.rb b/modules/exploits/windows/browser/novelliprint_executerequest.rb index 2c69e7aa9d..f38251f563 100644 --- a/modules/exploits/windows/browser/novelliprint_executerequest.rb +++ b/modules/exploits/windows/browser/novelliprint_executerequest.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0935' ], diff --git a/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb b/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb index 0f83732a6e..003743a2ef 100644 --- a/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb +++ b/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb @@ -51,7 +51,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3106' ], diff --git a/modules/exploits/windows/browser/novelliprint_getdriversettings.rb b/modules/exploits/windows/browser/novelliprint_getdriversettings.rb index df69d927d3..bec17f874b 100644 --- a/modules/exploits/windows/browser/novelliprint_getdriversettings.rb +++ b/modules/exploits/windows/browser/novelliprint_getdriversettings.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2908'], diff --git a/modules/exploits/windows/browser/novelliprint_getdriversettings_2.rb b/modules/exploits/windows/browser/novelliprint_getdriversettings_2.rb index 6fe009e8b3..0443392adf 100644 --- a/modules/exploits/windows/browser/novelliprint_getdriversettings_2.rb +++ b/modules/exploits/windows/browser/novelliprint_getdriversettings_2.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # metasploit module 'Dr_IDE' # original Exploit from exploit-db.com ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-4321' ], diff --git a/modules/exploits/windows/browser/novelliprint_target_frame.rb b/modules/exploits/windows/browser/novelliprint_target_frame.rb index 355ce95353..918f8aac83 100644 --- a/modules/exploits/windows/browser/novelliprint_target_frame.rb +++ b/modules/exploits/windows/browser/novelliprint_target_frame.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1568' ], diff --git a/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb b/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb index ea824475c9..54ea81754c 100644 --- a/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb +++ b/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4607' ], diff --git a/modules/exploits/windows/browser/orbit_connecting.rb b/modules/exploits/windows/browser/orbit_connecting.rb index 6229e62208..33b1424926 100644 --- a/modules/exploits/windows/browser/orbit_connecting.rb +++ b/modules/exploits/windows/browser/orbit_connecting.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0187' ], diff --git a/modules/exploits/windows/browser/pcvue_func.rb b/modules/exploits/windows/browser/pcvue_func.rb index 471b5fda93..52cdb83d3e 100644 --- a/modules/exploits/windows/browser/pcvue_func.rb +++ b/modules/exploits/windows/browser/pcvue_func.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # msf module 'TecR0c ',# msf module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4915'], diff --git a/modules/exploits/windows/browser/persits_xupload_traversal.rb b/modules/exploits/windows/browser/persits_xupload_traversal.rb index 4b533c2f11..a1c031c703 100644 --- a/modules/exploits/windows/browser/persits_xupload_traversal.rb +++ b/modules/exploits/windows/browser/persits_xupload_traversal.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3693'], diff --git a/modules/exploits/windows/browser/real_arcade_installerdlg.rb b/modules/exploits/windows/browser/real_arcade_installerdlg.rb index d77e295278..c44aa0c37d 100644 --- a/modules/exploits/windows/browser/real_arcade_installerdlg.rb +++ b/modules/exploits/windows/browser/real_arcade_installerdlg.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'rgod', #Initial discovery, poc 'sinn3r', #msf ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '71559' ], diff --git a/modules/exploits/windows/browser/realplayer_cdda_uri.rb b/modules/exploits/windows/browser/realplayer_cdda_uri.rb index b062117d2c..040b7d28fc 100644 --- a/modules/exploits/windows/browser/realplayer_cdda_uri.rb +++ b/modules/exploits/windows/browser/realplayer_cdda_uri.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'bannedit', 'sinn3r' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3747' ], diff --git a/modules/exploits/windows/browser/realplayer_console.rb b/modules/exploits/windows/browser/realplayer_console.rb index 95ebaa38a8..7f00c926a0 100644 --- a/modules/exploits/windows/browser/realplayer_console.rb +++ b/modules/exploits/windows/browser/realplayer_console.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Elazar Broad ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1309' ], diff --git a/modules/exploits/windows/browser/realplayer_import.rb b/modules/exploits/windows/browser/realplayer_import.rb index 3003ef4e1e..8c9c163770 100644 --- a/modules/exploits/windows/browser/realplayer_import.rb +++ b/modules/exploits/windows/browser/realplayer_import.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5601' ], diff --git a/modules/exploits/windows/browser/realplayer_qcp.rb b/modules/exploits/windows/browser/realplayer_qcp.rb index fe58dfb7f3..e4ed63dc45 100644 --- a/modules/exploits/windows/browser/realplayer_qcp.rb +++ b/modules/exploits/windows/browser/realplayer_qcp.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote At this moment this module exploits the flaw on Windows XP IE6, IE7. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Sean de Regge', # Vulnerability discovery diff --git a/modules/exploits/windows/browser/realplayer_smil.rb b/modules/exploits/windows/browser/realplayer_smil.rb index 18946b8a4e..f2dd12d263 100644 --- a/modules/exploits/windows/browser/realplayer_smil.rb +++ b/modules/exploits/windows/browser/realplayer_smil.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0455' ], diff --git a/modules/exploits/windows/browser/roxio_cineplayer.rb b/modules/exploits/windows/browser/roxio_cineplayer.rb index 5eb1818ae8..3b3f11cc39 100644 --- a/modules/exploits/windows/browser/roxio_cineplayer.rb +++ b/modules/exploits/windows/browser/roxio_cineplayer.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1559' ], diff --git a/modules/exploits/windows/browser/safari_xslt_output.rb b/modules/exploits/windows/browser/safari_xslt_output.rb index b0bfec4d8e..8d4f81f4e5 100644 --- a/modules/exploits/windows/browser/safari_xslt_output.rb +++ b/modules/exploits/windows/browser/safari_xslt_output.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => ['Nicolas Gregoire'], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-1774'], diff --git a/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb b/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb index 0df40e2d01..459c245cbe 100644 --- a/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb +++ b/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4475' ], diff --git a/modules/exploits/windows/browser/softartisans_getdrivename.rb b/modules/exploits/windows/browser/softartisans_getdrivename.rb index 65746019e0..c5b72f4817 100644 --- a/modules/exploits/windows/browser/softartisans_getdrivename.rb +++ b/modules/exploits/windows/browser/softartisans_getdrivename.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1682' ], diff --git a/modules/exploits/windows/browser/sonicwall_addrouteentry.rb b/modules/exploits/windows/browser/sonicwall_addrouteentry.rb index 339e21bf2b..7c7fb2dd35 100644 --- a/modules/exploits/windows/browser/sonicwall_addrouteentry.rb +++ b/modules/exploits/windows/browser/sonicwall_addrouteentry.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5603'], diff --git a/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb b/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb index ab55aa79ba..0b9454a827 100644 --- a/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb +++ b/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'BID', '36346' ], diff --git a/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb b/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb index ba111f6118..8ce25dd3f0 100644 --- a/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb +++ b/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3033' ], diff --git a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb index a27a17e17a..5234ebaff7 100644 --- a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb +++ b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4388' ], diff --git a/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb b/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb index 2151eef80d..f916a8a1fb 100644 --- a/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb +++ b/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Elazar Broad ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-6016' ], diff --git a/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb b/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb index 5adc79b03d..39eef2d54b 100644 --- a/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb +++ b/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Nikolas Sotiriu (lofi)' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3031'], diff --git a/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb b/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb index 87d11c7c66..fa818cd3df 100644 --- a/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb +++ b/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4385' ], diff --git a/modules/exploits/windows/browser/teechart_pro.rb b/modules/exploits/windows/browser/teechart_pro.rb index 470b883ae8..a4d4f7ac11 100644 --- a/modules/exploits/windows/browser/teechart_pro.rb +++ b/modules/exploits/windows/browser/teechart_pro.rb @@ -45,7 +45,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # initial discovery/msf module 'sinn3r', #Auto target, obfuscation, lots of testing ], - 'Version' => '$Revision$', 'References' => [ #[ 'CVE', '?' ], diff --git a/modules/exploits/windows/browser/trendmicro_extsetowner.rb b/modules/exploits/windows/browser/trendmicro_extsetowner.rb index 815ea5b172..a291ec056a 100644 --- a/modules/exploits/windows/browser/trendmicro_extsetowner.rb +++ b/modules/exploits/windows/browser/trendmicro_extsetowner.rb @@ -51,7 +51,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3189' ], diff --git a/modules/exploits/windows/browser/trendmicro_officescan.rb b/modules/exploits/windows/browser/trendmicro_officescan.rb index 84678cd33d..a84bb284ef 100644 --- a/modules/exploits/windows/browser/trendmicro_officescan.rb +++ b/modules/exploits/windows/browser/trendmicro_officescan.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-0325' ], diff --git a/modules/exploits/windows/browser/tumbleweed_filetransfer.rb b/modules/exploits/windows/browser/tumbleweed_filetransfer.rb index 1230d7112b..b32e45309e 100644 --- a/modules/exploits/windows/browser/tumbleweed_filetransfer.rb +++ b/modules/exploits/windows/browser/tumbleweed_filetransfer.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'patrick', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1724' ], diff --git a/modules/exploits/windows/browser/ultraoffice_httpupload.rb b/modules/exploits/windows/browser/ultraoffice_httpupload.rb index ae98bbfc77..302a822239 100644 --- a/modules/exploits/windows/browser/ultraoffice_httpupload.rb +++ b/modules/exploits/windows/browser/ultraoffice_httpupload.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'shinnai', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3878' ], diff --git a/modules/exploits/windows/browser/verypdf_pdfview.rb b/modules/exploits/windows/browser/verypdf_pdfview.rb index b42325c7a3..643e5f6bca 100644 --- a/modules/exploits/windows/browser/verypdf_pdfview.rb +++ b/modules/exploits/windows/browser/verypdf_pdfview.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC', 'dean ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5492'], diff --git a/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb b/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb index bcd12f64a7..3b773aed04 100644 --- a/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb +++ b/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'TecR0c ', # Metasploit module 'mr_me ' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0356' ], diff --git a/modules/exploits/windows/browser/vlc_amv.rb b/modules/exploits/windows/browser/vlc_amv.rb index d21215e30f..64c53be79d 100644 --- a/modules/exploits/windows/browser/vlc_amv.rb +++ b/modules/exploits/windows/browser/vlc_amv.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote please note that IE 8 targets require Java support in order to run properly. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'sinn3r', diff --git a/modules/exploits/windows/browser/webdav_dll_hijacker.rb b/modules/exploits/windows/browser/webdav_dll_hijacker.rb index 3195cb1ece..c21a92f050 100644 --- a/modules/exploits/windows/browser/webdav_dll_hijacker.rb +++ b/modules/exploits/windows/browser/webdav_dll_hijacker.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jcran', # Exploit vectors ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html'], diff --git a/modules/exploits/windows/browser/webex_ucf_newobject.rb b/modules/exploits/windows/browser/webex_ucf_newobject.rb index 0b6cdf8372..3674054caf 100644 --- a/modules/exploits/windows/browser/webex_ucf_newobject.rb +++ b/modules/exploits/windows/browser/webex_ucf_newobject.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Guido Landi', # milw0rm exploit 'jduck' # metasploit version ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3558' ], diff --git a/modules/exploits/windows/browser/winamp_playlist_unc.rb b/modules/exploits/windows/browser/winamp_playlist_unc.rb index e543a4755c..1ddbca6f78 100644 --- a/modules/exploits/windows/browser/winamp_playlist_unc.rb +++ b/modules/exploits/windows/browser/winamp_playlist_unc.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm', 'Faithless ' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-0476'], diff --git a/modules/exploits/windows/browser/winamp_ultravox.rb b/modules/exploits/windows/browser/winamp_ultravox.rb index 52011a0872..0f6ffdda68 100644 --- a/modules/exploits/windows/browser/winamp_ultravox.rb +++ b/modules/exploits/windows/browser/winamp_ultravox.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0065' ], diff --git a/modules/exploits/windows/browser/windvd7_applicationtype.rb b/modules/exploits/windows/browser/windvd7_applicationtype.rb index 6ffe0c2220..5d3c984f3f 100644 --- a/modules/exploits/windows/browser/windvd7_applicationtype.rb +++ b/modules/exploits/windows/browser/windvd7_applicationtype.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-0348' ], diff --git a/modules/exploits/windows/browser/winzip_fileview.rb b/modules/exploits/windows/browser/winzip_fileview.rb index ab339479b0..afb6b71111 100644 --- a/modules/exploits/windows/browser/winzip_fileview.rb +++ b/modules/exploits/windows/browser/winzip_fileview.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'dean ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE','2006-5198' ], diff --git a/modules/exploits/windows/browser/wmi_admintools.rb b/modules/exploits/windows/browser/wmi_admintools.rb index b7ca072f91..203571bbbe 100644 --- a/modules/exploits/windows/browser/wmi_admintools.rb +++ b/modules/exploits/windows/browser/wmi_admintools.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'WooYun', 'MC', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '69942'], diff --git a/modules/exploits/windows/browser/xmplay_asx.rb b/modules/exploits/windows/browser/xmplay_asx.rb index a9695b3be8..c9652d1f25 100644 --- a/modules/exploits/windows/browser/xmplay_asx.rb +++ b/modules/exploits/windows/browser/xmplay_asx.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6063'], diff --git a/modules/exploits/windows/browser/yahoomessenger_fvcom.rb b/modules/exploits/windows/browser/yahoomessenger_fvcom.rb index 8a6fc34f75..03079e7280 100644 --- a/modules/exploits/windows/browser/yahoomessenger_fvcom.rb +++ b/modules/exploits/windows/browser/yahoomessenger_fvcom.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4515' ], diff --git a/modules/exploits/windows/browser/yahoomessenger_server.rb b/modules/exploits/windows/browser/yahoomessenger_server.rb index d58c7d5bd3..3860acd820 100644 --- a/modules/exploits/windows/browser/yahoomessenger_server.rb +++ b/modules/exploits/windows/browser/yahoomessenger_server.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3147' ], diff --git a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb index e129824fed..98a65fe6a3 100644 --- a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb +++ b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2987' ], diff --git a/modules/exploits/windows/dcerpc/ms03_026_dcom.rb b/modules/exploits/windows/dcerpc/ms03_026_dcom.rb index 6b1bcb37f5..c926eb270c 100644 --- a/modules/exploits/windows/dcerpc/ms03_026_dcom.rb +++ b/modules/exploits/windows/dcerpc/ms03_026_dcom.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'spoonm', 'cazz' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0352' ], diff --git a/modules/exploits/windows/dcerpc/ms05_017_msmq.rb b/modules/exploits/windows/dcerpc/ms05_017_msmq.rb index 13491dea41..82971236ac 100644 --- a/modules/exploits/windows/dcerpc/ms05_017_msmq.rb +++ b/modules/exploits/windows/dcerpc/ms05_017_msmq.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0059'], diff --git a/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb b/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb index 886a0654de..5de7b057b2 100644 --- a/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb +++ b/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Unknown' # 2 unknown contributors (2003 support) ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-1748'], diff --git a/modules/exploits/windows/dcerpc/ms07_065_msmq.rb b/modules/exploits/windows/dcerpc/ms07_065_msmq.rb index f8ed6506f2..fe973a3415 100644 --- a/modules/exploits/windows/dcerpc/ms07_065_msmq.rb +++ b/modules/exploits/windows/dcerpc/ms07_065_msmq.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3039'], diff --git a/modules/exploits/windows/driver/broadcom_wifi_ssid.rb b/modules/exploits/windows/driver/broadcom_wifi_ssid.rb index 776a60b1ac..740492065d 100644 --- a/modules/exploits/windows/driver/broadcom_wifi_ssid.rb +++ b/modules/exploits/windows/driver/broadcom_wifi_ssid.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' # porting the C version to ruby ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-5882'], diff --git a/modules/exploits/windows/driver/dlink_wifi_rates.rb b/modules/exploits/windows/driver/dlink_wifi_rates.rb index 1c5cd64809..d716b045fe 100644 --- a/modules/exploits/windows/driver/dlink_wifi_rates.rb +++ b/modules/exploits/windows/driver/dlink_wifi_rates.rb @@ -53,7 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Johnny Cache ' # making all of this possible ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-6055'], diff --git a/modules/exploits/windows/driver/netgear_wg111_beacon.rb b/modules/exploits/windows/driver/netgear_wg111_beacon.rb index 235e67bece..b533aa4eae 100644 --- a/modules/exploits/windows/driver/netgear_wg111_beacon.rb +++ b/modules/exploits/windows/driver/netgear_wg111_beacon.rb @@ -45,7 +45,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-5972'], diff --git a/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb b/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb index 787530b552..8d9e0f68bf 100644 --- a/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb +++ b/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm', # First version 'skape', # Vista support ], - 'Version' => '$Revision$', 'References' => [ ['MSB', 'MS07-017'], diff --git a/modules/exploits/windows/email/ms10_045_outlook_ref_only.rb b/modules/exploits/windows/email/ms10_045_outlook_ref_only.rb index 3889b589a2..f6b0e920c7 100644 --- a/modules/exploits/windows/email/ms10_045_outlook_ref_only.rb +++ b/modules/exploits/windows/email/ms10_045_outlook_ref_only.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote command line options. }, 'Author' => 'Yorick Koster ', - 'Version' => '$Revision$', 'References' => [ ['MSB', 'MS10-045'], diff --git a/modules/exploits/windows/email/ms10_045_outlook_ref_resolve.rb b/modules/exploits/windows/email/ms10_045_outlook_ref_resolve.rb index 49323cefcc..820b965b72 100644 --- a/modules/exploits/windows/email/ms10_045_outlook_ref_resolve.rb +++ b/modules/exploits/windows/email/ms10_045_outlook_ref_resolve.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote command line options. }, 'Author' => 'Yorick Koster ', - 'Version' => '$Revision$', 'References' => [ ['MSB', 'MS10-045'], diff --git a/modules/exploits/windows/emc/alphastor_agent.rb b/modules/exploits/windows/emc/alphastor_agent.rb index bdad203c18..2f75b196a4 100644 --- a/modules/exploits/windows/emc/alphastor_agent.rb +++ b/modules/exploits/windows/emc/alphastor_agent.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2158' ], diff --git a/modules/exploits/windows/fileformat/a-pdf_wav_to_mp3.rb b/modules/exploits/windows/fileformat/a-pdf_wav_to_mp3.rb index c3696510a9..1870fcd47c 100644 --- a/modules/exploits/windows/fileformat/a-pdf_wav_to_mp3.rb +++ b/modules/exploits/windows/fileformat/a-pdf_wav_to_mp3.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Dr_IDE', # SEH Exploit 'dookie' # MSF Module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '67241' ], diff --git a/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb b/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb index 8e8ff8e80d..61f2d80f17 100644 --- a/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb +++ b/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Parvez Anwar', # Vulnerability discovery 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-2595' ], diff --git a/modules/exploits/windows/fileformat/acdsee_xpm.rb b/modules/exploits/windows/fileformat/acdsee_xpm.rb index f02488fa67..d3e2ed382f 100644 --- a/modules/exploits/windows/fileformat/acdsee_xpm.rb +++ b/modules/exploits/windows/fileformat/acdsee_xpm.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2193' ], diff --git a/modules/exploits/windows/fileformat/activepdf_webgrabber.rb b/modules/exploits/windows/fileformat/activepdf_webgrabber.rb index 0bdbdfbe1b..45e837d208 100644 --- a/modules/exploits/windows/fileformat/activepdf_webgrabber.rb +++ b/modules/exploits/windows/fileformat/activepdf_webgrabber.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64579'], diff --git a/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb b/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb index 394a0d07f5..34b1c70653 100644 --- a/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb +++ b/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC', 'Didier Stevens ', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5659' ], diff --git a/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb b/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb index 3878e46a95..a8ba842b7e 100644 --- a/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb +++ b/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote '@vicheck', # initial analysis 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2883' ], diff --git a/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb b/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb index 747c855396..b05399bf87 100644 --- a/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb +++ b/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Haifei Li', # PoC 'jduck' # Metasploit version ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-3654'], diff --git a/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb b/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb index ce657a6137..888ca01a96 100644 --- a/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb +++ b/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Unknown', # Found being openly exploited 'jduck' # Metasploit version ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2010-1297'], diff --git a/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb b/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb index 0754630ca4..6e9edb3247 100644 --- a/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb +++ b/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote # Metasploit version by: 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3459' ], diff --git a/modules/exploits/windows/fileformat/adobe_geticon.rb b/modules/exploits/windows/fileformat/adobe_geticon.rb index 822d33e1c3..ca79fcd9be 100644 --- a/modules/exploits/windows/fileformat/adobe_geticon.rb +++ b/modules/exploits/windows/fileformat/adobe_geticon.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Didier Stevens ', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0927' ], diff --git a/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb b/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb index 042d9371be..7ac0ee598c 100644 --- a/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb +++ b/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Nine:Situations:Group::pyrokinesis', 'dookie' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4195' ], diff --git a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb index dab5ffee86..596a71f3f5 100644 --- a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb +++ b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote # obfuscation techniques and pdf template from util_printf 'MC', 'Didier Stevens ', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE' , '2009-0658' ], diff --git a/modules/exploits/windows/fileformat/adobe_libtiff.rb b/modules/exploits/windows/fileformat/adobe_libtiff.rb index b7e14f5da4..d2f64182ca 100644 --- a/modules/exploits/windows/fileformat/adobe_libtiff.rb +++ b/modules/exploits/windows/fileformat/adobe_libtiff.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote # Metasploit version by: 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0188' ], diff --git a/modules/exploits/windows/fileformat/adobe_media_newplayer.rb b/modules/exploits/windows/fileformat/adobe_media_newplayer.rb index 351e8ce511..3ce77c39ef 100644 --- a/modules/exploits/windows/fileformat/adobe_media_newplayer.rb +++ b/modules/exploits/windows/fileformat/adobe_media_newplayer.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'pusscat', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4324' ], diff --git a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb index 261073536e..0af3d0701a 100644 --- a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb +++ b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Colin Ames ', # initial module 'jduck' # add Documents for vista/win7 ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1240' ], diff --git a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb index ac39baaf95..01deda83dd 100644 --- a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb +++ b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Jeremy Conway ', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1240' ], diff --git a/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb b/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb index fc04b7cd5c..c4c3d7d7ca 100644 --- a/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb +++ b/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Felipe Andres Manzano ', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3953' ], diff --git a/modules/exploits/windows/fileformat/adobe_utilprintf.rb b/modules/exploits/windows/fileformat/adobe_utilprintf.rb index 2d05034954..47c0519311 100644 --- a/modules/exploits/windows/fileformat/adobe_utilprintf.rb +++ b/modules/exploits/windows/fileformat/adobe_utilprintf.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC', 'Didier Stevens ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2992' ], diff --git a/modules/exploits/windows/fileformat/altap_salamander_pdb.rb b/modules/exploits/windows/fileformat/altap_salamander_pdb.rb index 824c124d37..554470b5cf 100644 --- a/modules/exploits/windows/fileformat/altap_salamander_pdb.rb +++ b/modules/exploits/windows/fileformat/altap_salamander_pdb.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3314' ], diff --git a/modules/exploits/windows/fileformat/aol_desktop_linktag.rb b/modules/exploits/windows/fileformat/aol_desktop_linktag.rb index 5b8e649847..9dfe139221 100644 --- a/modules/exploits/windows/fileformat/aol_desktop_linktag.rb +++ b/modules/exploits/windows/fileformat/aol_desktop_linktag.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote results arbitrary code execution. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'sup3r', #Initial disclosure, poc (9.5) diff --git a/modules/exploits/windows/fileformat/aol_phobos_bof.rb b/modules/exploits/windows/fileformat/aol_phobos_bof.rb index 68d3be74a6..d25a283f2e 100644 --- a/modules/exploits/windows/fileformat/aol_phobos_bof.rb +++ b/modules/exploits/windows/fileformat/aol_phobos_bof.rb @@ -51,7 +51,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Trancer ' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '61964'], diff --git a/modules/exploits/windows/fileformat/apple_quicktime_pnsize.rb b/modules/exploits/windows/fileformat/apple_quicktime_pnsize.rb index 3c078bdfbf..9ac8e2435e 100644 --- a/modules/exploits/windows/fileformat/apple_quicktime_pnsize.rb +++ b/modules/exploits/windows/fileformat/apple_quicktime_pnsize.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'MC', # Original Metasploit Module 'corelanc0d3r ', # Added DEP Bypass support ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-0257' ], diff --git a/modules/exploits/windows/fileformat/audio_wkstn_pls.rb b/modules/exploits/windows/fileformat/audio_wkstn_pls.rb index dfcf0cd944..dadaab71fd 100644 --- a/modules/exploits/windows/fileformat/audio_wkstn_pls.rb +++ b/modules/exploits/windows/fileformat/audio_wkstn_pls.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'germaya_x', 'dookie', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0476' ], diff --git a/modules/exploits/windows/fileformat/audiotran_pls.rb b/modules/exploits/windows/fileformat/audiotran_pls.rb index 793ce2c331..eca075b44d 100644 --- a/modules/exploits/windows/fileformat/audiotran_pls.rb +++ b/modules/exploits/windows/fileformat/audiotran_pls.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Sebastien Duquette', 'dookie', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0476'], diff --git a/modules/exploits/windows/fileformat/bacnet_csv.rb b/modules/exploits/windows/fileformat/bacnet_csv.rb index 2960bca19e..d8cfd14680 100644 --- a/modules/exploits/windows/fileformat/bacnet_csv.rb +++ b/modules/exploits/windows/fileformat/bacnet_csv.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Jeremy Brown', 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '68096'], diff --git a/modules/exploits/windows/fileformat/blazedvd_plf.rb b/modules/exploits/windows/fileformat/blazedvd_plf.rb index eb640a2176..349256f801 100644 --- a/modules/exploits/windows/fileformat/blazedvd_plf.rb +++ b/modules/exploits/windows/fileformat/blazedvd_plf.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE' , '2006-6199' ], diff --git a/modules/exploits/windows/fileformat/ca_cab.rb b/modules/exploits/windows/fileformat/ca_cab.rb index b19626ac79..d53b6c425c 100644 --- a/modules/exploits/windows/fileformat/ca_cab.rb +++ b/modules/exploits/windows/fileformat/ca_cab.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2864' ], diff --git a/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb b/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb index 0f14bd4895..1f31b9fc8a 100644 --- a/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb +++ b/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancek ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5405' ], diff --git a/modules/exploits/windows/fileformat/csound_getnum_bof.rb b/modules/exploits/windows/fileformat/csound_getnum_bof.rb index 11390576f6..4a14c0fb5c 100644 --- a/modules/exploits/windows/fileformat/csound_getnum_bof.rb +++ b/modules/exploits/windows/fileformat/csound_getnum_bof.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Secunia', # Vulnerability discovery 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-0270' ], diff --git a/modules/exploits/windows/fileformat/cytel_studio_cy3.rb b/modules/exploits/windows/fileformat/cytel_studio_cy3.rb index 8be23ef070..d76a4955da 100644 --- a/modules/exploits/windows/fileformat/cytel_studio_cy3.rb +++ b/modules/exploits/windows/fileformat/cytel_studio_cy3.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Luigi Auriemma', # Initial Discovery/PoC 'James Fitts ' # Metasploit Module (Thx Juan & Jeff) ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '75991' ], diff --git a/modules/exploits/windows/fileformat/deepburner_path.rb b/modules/exploits/windows/fileformat/deepburner_path.rb index 2f007f5a3b..91b9a591b7 100644 --- a/modules/exploits/windows/fileformat/deepburner_path.rb +++ b/modules/exploits/windows/fileformat/deepburner_path.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'fl0 fl0w', # re-discovered 2009/2010 'jduck' # metasploit version ], - 'Version' => '$Revision$', 'References' => [ [ 'BID', '21657' ], diff --git a/modules/exploits/windows/fileformat/destinymediaplayer16.rb b/modules/exploits/windows/fileformat/destinymediaplayer16.rb index 43e7bb44a4..da45606895 100644 --- a/modules/exploits/windows/fileformat/destinymediaplayer16.rb +++ b/modules/exploits/windows/fileformat/destinymediaplayer16.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancek ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3429' ], diff --git a/modules/exploits/windows/fileformat/digital_music_pad_pls.rb b/modules/exploits/windows/fileformat/digital_music_pad_pls.rb index 6b121cd9e7..ef60960341 100644 --- a/modules/exploits/windows/fileformat/digital_music_pad_pls.rb +++ b/modules/exploits/windows/fileformat/digital_music_pad_pls.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Abhishek Lyall ' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '68178' ], diff --git a/modules/exploits/windows/fileformat/djvu_imageurl.rb b/modules/exploits/windows/fileformat/djvu_imageurl.rb index 27e8f12282..cfdf5a1d77 100644 --- a/modules/exploits/windows/fileformat/djvu_imageurl.rb +++ b/modules/exploits/windows/fileformat/djvu_imageurl.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'dean ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4922' ], diff --git a/modules/exploits/windows/fileformat/dvdx_plf_bof.rb b/modules/exploits/windows/fileformat/dvdx_plf_bof.rb index d6ecd78cac..6e919aa73e 100644 --- a/modules/exploits/windows/fileformat/dvdx_plf_bof.rb +++ b/modules/exploits/windows/fileformat/dvdx_plf_bof.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote Windows XP SP2/SP3, Windows Vista, and Windows 7. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'n00b', #Initial discovery, poc for 4.1 diff --git a/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb b/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb index 5a2183ea3e..be3d67f758 100644 --- a/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb +++ b/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '58423'], diff --git a/modules/exploits/windows/fileformat/esignal_styletemplate_bof.rb b/modules/exploits/windows/fileformat/esignal_styletemplate_bof.rb index ac991de8fc..55b8a624fc 100644 --- a/modules/exploits/windows/fileformat/esignal_styletemplate_bof.rb +++ b/modules/exploits/windows/fileformat/esignal_styletemplate_bof.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'TecR0c ', # msf 'mr_me ', # msf ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-3494' ], diff --git a/modules/exploits/windows/fileformat/etrust_pestscan.rb b/modules/exploits/windows/fileformat/etrust_pestscan.rb index b0ce32e406..c65ed5d322 100644 --- a/modules/exploits/windows/fileformat/etrust_pestscan.rb +++ b/modules/exploits/windows/fileformat/etrust_pestscan.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4225' ], diff --git a/modules/exploits/windows/fileformat/ezip_wizard_bof.rb b/modules/exploits/windows/fileformat/ezip_wizard_bof.rb index d55033e499..26bf67ace8 100644 --- a/modules/exploits/windows/fileformat/ezip_wizard_bof.rb +++ b/modules/exploits/windows/fileformat/ezip_wizard_bof.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck', #Metasploit 'Lincoln', #Complete Metasploit port ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1028' ], diff --git a/modules/exploits/windows/fileformat/fatplayer_wav.rb b/modules/exploits/windows/fileformat/fatplayer_wav.rb index 916088f462..7e12557da4 100644 --- a/modules/exploits/windows/fileformat/fatplayer_wav.rb +++ b/modules/exploits/windows/fileformat/fatplayer_wav.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'James Fitts ', # Original Exploit 'dookie', # Metasploit Module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4962'], diff --git a/modules/exploits/windows/fileformat/fdm_torrent.rb b/modules/exploits/windows/fileformat/fdm_torrent.rb index 2c51c2d35a..73f15b7e87 100644 --- a/modules/exploits/windows/fileformat/fdm_torrent.rb +++ b/modules/exploits/windows/fileformat/fdm_torrent.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'SkD ', 'jduck', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0184' ], diff --git a/modules/exploits/windows/fileformat/feeddemon_opml.rb b/modules/exploits/windows/fileformat/feeddemon_opml.rb index 19c8168ac8..466c1e6749 100644 --- a/modules/exploits/windows/fileformat/feeddemon_opml.rb +++ b/modules/exploits/windows/fileformat/feeddemon_opml.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'dookie', # MSF Module 'jduck' # SEH + AlphanumMixed fixes ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0546' ], diff --git a/modules/exploits/windows/fileformat/foxit_reader_filewrite.rb b/modules/exploits/windows/fileformat/foxit_reader_filewrite.rb index 6696027c20..25142e6fad 100644 --- a/modules/exploits/windows/fileformat/foxit_reader_filewrite.rb +++ b/modules/exploits/windows/fileformat/foxit_reader_filewrite.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'bannedit', # metasploit module 'Chris Evans' # Initial discovery and exploit ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '71104' ], diff --git a/modules/exploits/windows/fileformat/foxit_reader_launch.rb b/modules/exploits/windows/fileformat/foxit_reader_launch.rb index a698daff98..52b05457f3 100644 --- a/modules/exploits/windows/fileformat/foxit_reader_launch.rb +++ b/modules/exploits/windows/fileformat/foxit_reader_launch.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Francisco Falcon', # Discovery 'bannedit' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE' , '2009-0837' ], diff --git a/modules/exploits/windows/fileformat/foxit_title_bof.rb b/modules/exploits/windows/fileformat/foxit_title_bof.rb index 897330913c..703d1c5640 100644 --- a/modules/exploits/windows/fileformat/foxit_title_bof.rb +++ b/modules/exploits/windows/fileformat/foxit_title_bof.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote NOTE: This exploit does not use javascript. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'dookie', # Discovered the bug diff --git a/modules/exploits/windows/fileformat/galan_fileformat_bof.rb b/modules/exploits/windows/fileformat/galan_fileformat_bof.rb index 113d07e126..5bd79077df 100644 --- a/modules/exploits/windows/fileformat/galan_fileformat_bof.rb +++ b/modules/exploits/windows/fileformat/galan_fileformat_bof.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Jeremy Brown <0xjbrown41[at]gmail.com>', 'loneferret', ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '60897' ], diff --git a/modules/exploits/windows/fileformat/gta_samp.rb b/modules/exploits/windows/fileformat/gta_samp.rb index a4103c5980..26f6865d40 100644 --- a/modules/exploits/windows/fileformat/gta_samp.rb +++ b/modules/exploits/windows/fileformat/gta_samp.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Silent_Dream', # Original discovery, MSF Module, template by mona.py ], - 'Version' => '$Revision$', 'References' => [ [ 'EDB', '17893' ] diff --git a/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb b/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb index 054393ef84..0edfc9e4fd 100644 --- a/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb +++ b/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'bratax', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-0564'], diff --git a/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb b/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb index 8295791a0b..d084fe8c90 100644 --- a/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb +++ b/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'bratax', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-0564' ], diff --git a/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb b/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb index d15483845e..0238ae08ac 100644 --- a/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb +++ b/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Encrypt3d.M!nd', 'loneferret', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0133' ], diff --git a/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb b/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb index b33b0ef633..f4087fa832 100644 --- a/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb +++ b/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'His0k4', 'jduck', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2485' ], diff --git a/modules/exploits/windows/fileformat/ideal_migration_ipj.rb b/modules/exploits/windows/fileformat/ideal_migration_ipj.rb index f94285b8e8..7fad269596 100644 --- a/modules/exploits/windows/fileformat/ideal_migration_ipj.rb +++ b/modules/exploits/windows/fileformat/ideal_migration_ipj.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Dr_IDE', 'dookie', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4265' ], diff --git a/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb b/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb index 8819f805dc..12f4b03f30 100644 --- a/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb +++ b/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # msf-fu 'juan vazquez' # more improvements ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-0897' ], diff --git a/modules/exploits/windows/fileformat/lotusnotes_lzh.rb b/modules/exploits/windows/fileformat/lotusnotes_lzh.rb index dc28eb83c3..7ecc6aecb5 100644 --- a/modules/exploits/windows/fileformat/lotusnotes_lzh.rb +++ b/modules/exploits/windows/fileformat/lotusnotes_lzh.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'binaryhouse.net', # original discovery 'alino <26alino[at]gmail.com>', # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-1213'], diff --git a/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb b/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb index 33a1a30c5b..fc25548054 100644 --- a/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb +++ b/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'acidgen', #found the vulnerability 'corelanc0d3r ' #rop exploit + msf module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '72063'], diff --git a/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb b/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb index 0f4ced0650..232faab382 100644 --- a/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb +++ b/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.metasploit.com' ], diff --git a/modules/exploits/windows/fileformat/mediajukebox.rb b/modules/exploits/windows/fileformat/mediajukebox.rb index a8aaaba83b..67d6978345 100644 --- a/modules/exploits/windows/fileformat/mediajukebox.rb +++ b/modules/exploits/windows/fileformat/mediajukebox.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Ron Henry ', 'dijital1', ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '55924' ], diff --git a/modules/exploits/windows/fileformat/microp_mppl.rb b/modules/exploits/windows/fileformat/microp_mppl.rb index c143231544..ef372786a8 100644 --- a/modules/exploits/windows/fileformat/microp_mppl.rb +++ b/modules/exploits/windows/fileformat/microp_mppl.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'James Fitts ' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '73627'], diff --git a/modules/exploits/windows/fileformat/millenium_mp3_pls.rb b/modules/exploits/windows/fileformat/millenium_mp3_pls.rb index 78391484f9..85c74d3458 100644 --- a/modules/exploits/windows/fileformat/millenium_mp3_pls.rb +++ b/modules/exploits/windows/fileformat/millenium_mp3_pls.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Molotov ', 'dookie', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '56574' ], diff --git a/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb b/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb index 305ebe9b4d..9620228327 100644 --- a/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb +++ b/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Tiago Henriques', # metasploit module 'James Fitts ' # clean ups ], - 'Version' => '$Revision$', 'References' => [ [ 'EDB', '14373' ], diff --git a/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb b/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb index 3f47b80324..6f6214a760 100644 --- a/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb +++ b/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'rick2600', #found the vulnerabilities 'corelanc0d3r ', #rop exploit + msf module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '72101'], diff --git a/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb b/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb index 073dd829de..76cc8d3cf9 100644 --- a/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb +++ b/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'rick2600', #found the vulnerabilities 'corelanc0d3r ', #rop exploit + msf module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '72102'], diff --git a/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb b/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb index d8f0f163f3..3e0b1b480f 100644 --- a/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb +++ b/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-4742' ], diff --git a/modules/exploits/windows/fileformat/mplayer_sami_bof.rb b/modules/exploits/windows/fileformat/mplayer_sami_bof.rb index c3e4fcba29..baa446304c 100644 --- a/modules/exploits/windows/fileformat/mplayer_sami_bof.rb +++ b/modules/exploits/windows/fileformat/mplayer_sami_bof.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Jacques Louw', # Vulnerability Discovery and PoC 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'BID', '49149' ], diff --git a/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb b/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb index 7c5a716b1d..e0486db53c 100644 --- a/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb +++ b/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Sean Larsson', # original discovery 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE','2009-3129' ], diff --git a/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb b/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb index 31b0ac24a0..74c9a6c491 100644 --- a/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb +++ b/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Snake', # PoC 'jduck' # metasploit version ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0033' ], diff --git a/modules/exploits/windows/fileformat/ms10_087_rtf_pfragments_bof.rb b/modules/exploits/windows/fileformat/ms10_087_rtf_pfragments_bof.rb index 118cead5c0..a9bb8d19dd 100644 --- a/modules/exploits/windows/fileformat/ms10_087_rtf_pfragments_bof.rb +++ b/modules/exploits/windows/fileformat/ms10_087_rtf_pfragments_bof.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck', # Metasploit module 'DJ Manila Ice, Vesh, CA' # more office 2007 for the lulz ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3333' ], diff --git a/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb b/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb index 477595c952..c12b817625 100644 --- a/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb +++ b/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Yaniv Miron aka Lament of ilhack', 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3970' ], diff --git a/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb b/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb index 36056b85b1..7e40c4f300 100644 --- a/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb +++ b/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote user the user. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Aniway', #Initial discovery (via ZDI) diff --git a/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb b/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb index 4cdd53cd92..dd317eecd0 100644 --- a/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb +++ b/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4776' ], diff --git a/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb b/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb index 40156484ac..e7b2940bc7 100644 --- a/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb +++ b/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'dean ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE','2008-1898' ], diff --git a/modules/exploits/windows/fileformat/mymp3player_m3u.rb b/modules/exploits/windows/fileformat/mymp3player_m3u.rb index 9e8002f843..6d14021cfc 100644 --- a/modules/exploits/windows/fileformat/mymp3player_m3u.rb +++ b/modules/exploits/windows/fileformat/mymp3player_m3u.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'n3w7u', # original 'm_101' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64580'], diff --git a/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb b/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb index e8171379bd..98d938812d 100644 --- a/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb +++ b/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote This exploit does not use javascript. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'corelanc0d3r ', diff --git a/modules/exploits/windows/fileformat/orbital_viewer_orb.rb b/modules/exploits/windows/fileformat/orbital_viewer_orb.rb index 62212bff49..95496d38c2 100644 --- a/modules/exploits/windows/fileformat/orbital_viewer_orb.rb +++ b/modules/exploits/windows/fileformat/orbital_viewer_orb.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'BID', '38436' ], diff --git a/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb b/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb index 2a411c6242..3933d96644 100644 --- a/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb +++ b/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3214' ], diff --git a/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb b/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb index 2fb6a083f4..5d8add038b 100644 --- a/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb +++ b/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'C4SS!0 G0M3S', # Vulnerability discovery and original exploit 'TecR0c ', # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'BID', '46059' ], diff --git a/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb b/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb index 062ca5ee5c..e584604a76 100644 --- a/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb +++ b/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3861' ], diff --git a/modules/exploits/windows/fileformat/sascam_get.rb b/modules/exploits/windows/fileformat/sascam_get.rb index 5cd2a36269..f77c640060 100644 --- a/modules/exploits/windows/fileformat/sascam_get.rb +++ b/modules/exploits/windows/fileformat/sascam_get.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'dean ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-6898' ], diff --git a/modules/exploits/windows/fileformat/scadaphone_zip.rb b/modules/exploits/windows/fileformat/scadaphone_zip.rb index 847187ed5f..a6284944a8 100644 --- a/modules/exploits/windows/fileformat/scadaphone_zip.rb +++ b/modules/exploits/windows/fileformat/scadaphone_zip.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'mr_me ', # found + msf ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-4535' ], diff --git a/modules/exploits/windows/fileformat/somplplayer_m3u.rb b/modules/exploits/windows/fileformat/somplplayer_m3u.rb index dd15a9fbcf..cb9dec4e1b 100644 --- a/modules/exploits/windows/fileformat/somplplayer_m3u.rb +++ b/modules/exploits/windows/fileformat/somplplayer_m3u.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Rick2600', # Original Exploit 'dookie' # MSF Module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64368' ], diff --git a/modules/exploits/windows/fileformat/subtitle_processor_m3u_bof.rb b/modules/exploits/windows/fileformat/subtitle_processor_m3u_bof.rb index a31debb94b..0beb3762c7 100644 --- a/modules/exploits/windows/fileformat/subtitle_processor_m3u_bof.rb +++ b/modules/exploits/windows/fileformat/subtitle_processor_m3u_bof.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote arbitrary code execution. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Brandon Murphy', #Initial discovery, poc diff --git a/modules/exploits/windows/fileformat/tugzip.rb b/modules/exploits/windows/fileformat/tugzip.rb index bd4719a344..7e69975853 100644 --- a/modules/exploits/windows/fileformat/tugzip.rb +++ b/modules/exploits/windows/fileformat/tugzip.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'TecR0c ', # Metasploit module 'mr_me ', # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '49371' ], diff --git a/modules/exploits/windows/fileformat/ultraiso_ccd.rb b/modules/exploits/windows/fileformat/ultraiso_ccd.rb index 9b1c84afe0..f5f9ab29da 100644 --- a/modules/exploits/windows/fileformat/ultraiso_ccd.rb +++ b/modules/exploits/windows/fileformat/ultraiso_ccd.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1260' ], diff --git a/modules/exploits/windows/fileformat/ultraiso_cue.rb b/modules/exploits/windows/fileformat/ultraiso_cue.rb index 1653e972d6..04c431c2cf 100644 --- a/modules/exploits/windows/fileformat/ultraiso_cue.rb +++ b/modules/exploits/windows/fileformat/ultraiso_cue.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'n00b', # original discovery 'jduck' # metasploit version ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2888' ], diff --git a/modules/exploits/windows/fileformat/ursoft_w32dasm.rb b/modules/exploits/windows/fileformat/ursoft_w32dasm.rb index cd67978146..49e415f40a 100644 --- a/modules/exploits/windows/fileformat/ursoft_w32dasm.rb +++ b/modules/exploits/windows/fileformat/ursoft_w32dasm.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0308' ], diff --git a/modules/exploits/windows/fileformat/varicad_dwb.rb b/modules/exploits/windows/fileformat/varicad_dwb.rb index 375aeea09c..c4634e6767 100644 --- a/modules/exploits/windows/fileformat/varicad_dwb.rb +++ b/modules/exploits/windows/fileformat/varicad_dwb.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'MC', # cleanup pass 1 & second offset 'jduck' # cleanup pass 2 & combined offsets ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '63067' ], diff --git a/modules/exploits/windows/fileformat/videolan_tivo.rb b/modules/exploits/windows/fileformat/videolan_tivo.rb index 278ead8e6c..6bff61b596 100644 --- a/modules/exploits/windows/fileformat/videolan_tivo.rb +++ b/modules/exploits/windows/fileformat/videolan_tivo.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4654' ], diff --git a/modules/exploits/windows/fileformat/videospirit_visprj.rb b/modules/exploits/windows/fileformat/videospirit_visprj.rb index bd719b081e..ff056c214c 100644 --- a/modules/exploits/windows/fileformat/videospirit_visprj.rb +++ b/modules/exploits/windows/fileformat/videospirit_visprj.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Acidgen', #found the vulnerability 'corelanc0d3r ', #rop exploit + msf module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-0499'], diff --git a/modules/exploits/windows/fileformat/visio_dxf_bof.rb b/modules/exploits/windows/fileformat/visio_dxf_bof.rb index 50128d1455..d2b15fc149 100644 --- a/modules/exploits/windows/fileformat/visio_dxf_bof.rb +++ b/modules/exploits/windows/fileformat/visio_dxf_bof.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Shahin Ramezany ', # MOAUB #8 exploit and binary analysis 'juan vazquez', # metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE','2010-1681' ], diff --git a/modules/exploits/windows/fileformat/visiwave_vwr_type.rb b/modules/exploits/windows/fileformat/visiwave_vwr_type.rb index f29d7ee608..26c30ebf60 100644 --- a/modules/exploits/windows/fileformat/visiwave_vwr_type.rb +++ b/modules/exploits/windows/fileformat/visiwave_vwr_type.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # original discovery & msf exploit 'TecR0c ' # msf exploit ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-2386' ], diff --git a/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb b/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb index abbf9e8449..fbd1812f92 100644 --- a/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb +++ b/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1574' ], diff --git a/modules/exploits/windows/fileformat/vlc_realtext.rb b/modules/exploits/windows/fileformat/vlc_realtext.rb index 7cec8a7364..29c34b6aac 100644 --- a/modules/exploits/windows/fileformat/vlc_realtext.rb +++ b/modules/exploits/windows/fileformat/vlc_realtext.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'SkD', # Exploit 'juan vazquez' # Metasploit Module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '49809' ], diff --git a/modules/exploits/windows/fileformat/vlc_smb_uri.rb b/modules/exploits/windows/fileformat/vlc_smb_uri.rb index 1d536790bc..5afb287f1f 100644 --- a/modules/exploits/windows/fileformat/vlc_smb_uri.rb +++ b/modules/exploits/windows/fileformat/vlc_smb_uri.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'BID', '35500' ], diff --git a/modules/exploits/windows/fileformat/vlc_webm.rb b/modules/exploits/windows/fileformat/vlc_webm.rb index 7f8dceb0fc..975c42c582 100644 --- a/modules/exploits/windows/fileformat/vlc_webm.rb +++ b/modules/exploits/windows/fileformat/vlc_webm.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Dan Rosenberg' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '70698' ], diff --git a/modules/exploits/windows/fileformat/vuplayer_cue.rb b/modules/exploits/windows/fileformat/vuplayer_cue.rb index 3eb4d69ca6..dd1281cb9a 100644 --- a/modules/exploits/windows/fileformat/vuplayer_cue.rb +++ b/modules/exploits/windows/fileformat/vuplayer_cue.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64581'], diff --git a/modules/exploits/windows/fileformat/vuplayer_m3u.rb b/modules/exploits/windows/fileformat/vuplayer_m3u.rb index 4dfc2ffca1..9288e1253f 100644 --- a/modules/exploits/windows/fileformat/vuplayer_m3u.rb +++ b/modules/exploits/windows/fileformat/vuplayer_m3u.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6251' ], diff --git a/modules/exploits/windows/fileformat/wireshark_packet_dect.rb b/modules/exploits/windows/fileformat/wireshark_packet_dect.rb index ae165c92bc..e640d3444a 100644 --- a/modules/exploits/windows/fileformat/wireshark_packet_dect.rb +++ b/modules/exploits/windows/fileformat/wireshark_packet_dect.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'sickness', #proof of concept 'corelanc0d3r ', #rop exploit + msf module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1591'], diff --git a/modules/exploits/windows/fileformat/wm_downloader_m3u.rb b/modules/exploits/windows/fileformat/wm_downloader_m3u.rb index 3e72999dd0..47e2aab926 100644 --- a/modules/exploits/windows/fileformat/wm_downloader_m3u.rb +++ b/modules/exploits/windows/fileformat/wm_downloader_m3u.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'fdisk', # Original Exploit 'dookie' # MSF Module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '66911'], diff --git a/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb b/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb index 9a793d73f9..d73dd2c758 100644 --- a/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb +++ b/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'loneferret', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '57162' ], diff --git a/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb b/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb index ce274e3f22..1b96e69912 100644 --- a/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb +++ b/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote structured exception handler record. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'hadji samir ', # Discovered the bug diff --git a/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb b/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb index b6ddfbd1d7..a5dfaef02e 100644 --- a/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb +++ b/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancek ', 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0964' ], diff --git a/modules/exploits/windows/firewall/blackice_pam_icq.rb b/modules/exploits/windows/firewall/blackice_pam_icq.rb index 1efc36d0e4..8d387fc183 100644 --- a/modules/exploits/windows/firewall/blackice_pam_icq.rb +++ b/modules/exploits/windows/firewall/blackice_pam_icq.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'spoonm', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2004-0362'], diff --git a/modules/exploits/windows/firewall/kerio_auth.rb b/modules/exploits/windows/firewall/kerio_auth.rb index fb163a0d9a..32478da6bf 100644 --- a/modules/exploits/windows/firewall/kerio_auth.rb +++ b/modules/exploits/windows/firewall/kerio_auth.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2003-0220'], diff --git a/modules/exploits/windows/ftp/32bitftp_list_reply.rb b/modules/exploits/windows/ftp/32bitftp_list_reply.rb index edd397cbb5..99217202b7 100644 --- a/modules/exploits/windows/ftp/32bitftp_list_reply.rb +++ b/modules/exploits/windows/ftp/32bitftp_list_reply.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ' # helped writing this module ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], diff --git a/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb b/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb index f24449e482..bcc6c0e02c 100644 --- a/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb +++ b/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'otr' # Windows XP SP3 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0277'], diff --git a/modules/exploits/windows/ftp/aasync_list_reply.rb b/modules/exploits/windows/ftp/aasync_list_reply.rb index 62faedfa03..5a98653706 100644 --- a/modules/exploits/windows/ftp/aasync_list_reply.rb +++ b/modules/exploits/windows/ftp/aasync_list_reply.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ', #found bug and wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], diff --git a/modules/exploits/windows/ftp/cesarftp_mkd.rb b/modules/exploits/windows/ftp/cesarftp_mkd.rb index 738900a9fa..01808aba44 100644 --- a/modules/exploits/windows/ftp/cesarftp_mkd.rb +++ b/modules/exploits/windows/ftp/cesarftp_mkd.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2961'], diff --git a/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb b/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb index a8624480c9..ab84ee523e 100644 --- a/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb +++ b/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # When a DoS is NOT a DoS diff --git a/modules/exploits/windows/ftp/dreamftp_format.rb b/modules/exploits/windows/ftp/dreamftp_format.rb index b5b9154d86..cd636cae98 100644 --- a/modules/exploits/windows/ftp/dreamftp_format.rb +++ b/modules/exploits/windows/ftp/dreamftp_format.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2074'], diff --git a/modules/exploits/windows/ftp/easyfilesharing_pass.rb b/modules/exploits/windows/ftp/easyfilesharing_pass.rb index 4b1e315c97..7a57f1b24f 100644 --- a/modules/exploits/windows/ftp/easyfilesharing_pass.rb +++ b/modules/exploits/windows/ftp/easyfilesharing_pass.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-3952' ], diff --git a/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb b/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb index 6475b0aeb7..125e27e1bb 100644 --- a/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb +++ b/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # various fixes, remove most hardcoded addresses ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '62134' ], diff --git a/modules/exploits/windows/ftp/easyftp_list_fixret.rb b/modules/exploits/windows/ftp/easyftp_list_fixret.rb index 85295922e8..0f96e523ef 100644 --- a/modules/exploits/windows/ftp/easyftp_list_fixret.rb +++ b/modules/exploits/windows/ftp/easyftp_list_fixret.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # modified to use fix-up stub (works with bigger payloads) ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '62134' ], diff --git a/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb b/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb index 7dfee14ca2..3dfa8447eb 100644 --- a/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb +++ b/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # port to metasploit / modified to use fix-up stub (works with bigger payloads) ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '62134' ], diff --git a/modules/exploits/windows/ftp/filecopa_list_overflow.rb b/modules/exploits/windows/ftp/filecopa_list_overflow.rb index 983dbcd7bc..c5cb6daa18 100644 --- a/modules/exploits/windows/ftp/filecopa_list_overflow.rb +++ b/modules/exploits/windows/ftp/filecopa_list_overflow.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Jacopo Cervini' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-3726' ], diff --git a/modules/exploits/windows/ftp/filewrangler_list_reply.rb b/modules/exploits/windows/ftp/filewrangler_list_reply.rb index 0eb509b32b..332928ee57 100644 --- a/modules/exploits/windows/ftp/filewrangler_list_reply.rb +++ b/modules/exploits/windows/ftp/filewrangler_list_reply.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ' # wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], diff --git a/modules/exploits/windows/ftp/freeftpd_user.rb b/modules/exploits/windows/ftp/freeftpd_user.rb index a03efe77ec..1e4513fbaa 100644 --- a/modules/exploits/windows/ftp/freeftpd_user.rb +++ b/modules/exploits/windows/ftp/freeftpd_user.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-3683'], diff --git a/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb b/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb index c36fcae995..39a72696ab 100644 --- a/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb +++ b/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ', # wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'OSVDB', '68638'], diff --git a/modules/exploits/windows/ftp/ftppad_list_reply.rb b/modules/exploits/windows/ftp/ftppad_list_reply.rb index 48976091a6..3f7c3ba179 100644 --- a/modules/exploits/windows/ftp/ftppad_list_reply.rb +++ b/modules/exploits/windows/ftp/ftppad_list_reply.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r' ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], diff --git a/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb b/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb index d1c4b86fda..a8f5092563 100644 --- a/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb +++ b/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ' #found bug, wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'OSVDB', '68639'], diff --git a/modules/exploits/windows/ftp/ftpsynch_list_reply.rb b/modules/exploits/windows/ftp/ftpsynch_list_reply.rb index 909af837bf..14c83a9acb 100644 --- a/modules/exploits/windows/ftp/ftpsynch_list_reply.rb +++ b/modules/exploits/windows/ftp/ftpsynch_list_reply.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ' #wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], diff --git a/modules/exploits/windows/ftp/gekkomgr_list_reply.rb b/modules/exploits/windows/ftp/gekkomgr_list_reply.rb index e2554a11bb..51e50ec426 100644 --- a/modules/exploits/windows/ftp/gekkomgr_list_reply.rb +++ b/modules/exploits/windows/ftp/gekkomgr_list_reply.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ', # wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'OSVDB', '68641'], diff --git a/modules/exploits/windows/ftp/globalscapeftp_input.rb b/modules/exploits/windows/ftp/globalscapeftp_input.rb index 701c39e932..473e949ac2 100644 --- a/modules/exploits/windows/ftp/globalscapeftp_input.rb +++ b/modules/exploits/windows/ftp/globalscapeftp_input.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Fairuzan Roslan ', 'Mati Aharoni ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-1415'], diff --git a/modules/exploits/windows/ftp/goldenftp_pass_bof.rb b/modules/exploits/windows/ftp/goldenftp_pass_bof.rb index 8af478c0bd..0f049517ff 100644 --- a/modules/exploits/windows/ftp/goldenftp_pass_bof.rb +++ b/modules/exploits/windows/ftp/goldenftp_pass_bof.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Joff Thyer ', #Improved msf version ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6576'], diff --git a/modules/exploits/windows/ftp/httpdx_tolog_format.rb b/modules/exploits/windows/ftp/httpdx_tolog_format.rb index 2b30e6b992..16907d90f9 100644 --- a/modules/exploits/windows/ftp/httpdx_tolog_format.rb +++ b/modules/exploits/windows/ftp/httpdx_tolog_format.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'jduck' # original discovery and metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4769' ], diff --git a/modules/exploits/windows/ftp/leapftp_list_reply.rb b/modules/exploits/windows/ftp/leapftp_list_reply.rb index d9a96f6714..d760df57c7 100644 --- a/modules/exploits/windows/ftp/leapftp_list_reply.rb +++ b/modules/exploits/windows/ftp/leapftp_list_reply.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote 'nullthreat' # Ported PoC to MSF ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'OSVDB', '68640'], diff --git a/modules/exploits/windows/ftp/leapftp_pasv_reply.rb b/modules/exploits/windows/ftp/leapftp_pasv_reply.rb index 81f0ffdc55..0b350bde84 100644 --- a/modules/exploits/windows/ftp/leapftp_pasv_reply.rb +++ b/modules/exploits/windows/ftp/leapftp_pasv_reply.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0558' ], diff --git a/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb b/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb index 1b6aea5568..b26e572e18 100644 --- a/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb +++ b/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Kingcope ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['EDB', '9541'], diff --git a/modules/exploits/windows/ftp/netterm_netftpd_user.rb b/modules/exploits/windows/ftp/netterm_netftpd_user.rb index 4843ba5153..e6bfa84d5d 100644 --- a/modules/exploits/windows/ftp/netterm_netftpd_user.rb +++ b/modules/exploits/windows/ftp/netterm_netftpd_user.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-1323'], diff --git a/modules/exploits/windows/ftp/odin_list_reply.rb b/modules/exploits/windows/ftp/odin_list_reply.rb index 2cb35e6a5b..d9e04da195 100644 --- a/modules/exploits/windows/ftp/odin_list_reply.rb +++ b/modules/exploits/windows/ftp/odin_list_reply.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ', #wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'OSVDB', '68824' ], diff --git a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb index a528833009..43fcbf0041 100644 --- a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb +++ b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0727'], diff --git a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb index 5f8e891837..863a0a5839 100644 --- a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb +++ b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'David Litchfield ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'References' => [ diff --git a/modules/exploits/windows/ftp/proftp_banner.rb b/modules/exploits/windows/ftp/proftp_banner.rb index 74fc43382b..68791b8c29 100644 --- a/modules/exploits/windows/ftp/proftp_banner.rb +++ b/modules/exploits/windows/ftp/proftp_banner.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'His0k4 ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3976' ], diff --git a/modules/exploits/windows/ftp/sami_ftpd_user.rb b/modules/exploits/windows/ftp/sami_ftpd_user.rb index 05c18cb9d1..7e75fdaf0d 100644 --- a/modules/exploits/windows/ftp/sami_ftpd_user.rb +++ b/modules/exploits/windows/ftp/sami_ftpd_user.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Stance' => Msf::Exploit::Stance::Passive, 'References' => [ diff --git a/modules/exploits/windows/ftp/sasser_ftpd_port.rb b/modules/exploits/windows/ftp/sasser_ftpd_port.rb index ef4ece809e..7ad15463e1 100644 --- a/modules/exploits/windows/ftp/sasser_ftpd_port.rb +++ b/modules/exploits/windows/ftp/sasser_ftpd_port.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ '', '', 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '6197'], diff --git a/modules/exploits/windows/ftp/scriptftp_list.rb b/modules/exploits/windows/ftp/scriptftp_list.rb index decdd018b5..b4ab754d4b 100644 --- a/modules/exploits/windows/ftp/scriptftp_list.rb +++ b/modules/exploits/windows/ftp/scriptftp_list.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote to gain the same rights as the user running ScriptFTP. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'modpr0be', #Vulnerability discovery and original exploit diff --git a/modules/exploits/windows/ftp/seagull_list_reply.rb b/modules/exploits/windows/ftp/seagull_list_reply.rb index ce652c02d9..4865b02b95 100644 --- a/modules/exploits/windows/ftp/seagull_list_reply.rb +++ b/modules/exploits/windows/ftp/seagull_list_reply.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'corelanc0d3r ' # found bug, wrote the exploit ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], diff --git a/modules/exploits/windows/ftp/servu_chmod.rb b/modules/exploits/windows/ftp/servu_chmod.rb index 03d4747002..8e62006150 100644 --- a/modules/exploits/windows/ftp/servu_chmod.rb +++ b/modules/exploits/windows/ftp/servu_chmod.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'theLightCosine', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2111'], diff --git a/modules/exploits/windows/ftp/servu_mdtm.rb b/modules/exploits/windows/ftp/servu_mdtm.rb index 8d334865c7..3f2ae6ecf3 100644 --- a/modules/exploits/windows/ftp/servu_mdtm.rb +++ b/modules/exploits/windows/ftp/servu_mdtm.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'spoonm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0330'], diff --git a/modules/exploits/windows/ftp/slimftpd_list_concat.rb b/modules/exploits/windows/ftp/slimftpd_list_concat.rb index b706ae695d..6d72f99cea 100644 --- a/modules/exploits/windows/ftp/slimftpd_list_concat.rb +++ b/modules/exploits/windows/ftp/slimftpd_list_concat.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Fairuzan Roslan ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2373'], diff --git a/modules/exploits/windows/ftp/trellian_client_pasv.rb b/modules/exploits/windows/ftp/trellian_client_pasv.rb index d350604c4c..62dd407f7b 100644 --- a/modules/exploits/windows/ftp/trellian_client_pasv.rb +++ b/modules/exploits/windows/ftp/trellian_client_pasv.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote 'dookie' # MSF module author ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1465'], diff --git a/modules/exploits/windows/ftp/vermillion_ftpd_port.rb b/modules/exploits/windows/ftp/vermillion_ftpd_port.rb index 671822d7d2..8746a5dbf6 100644 --- a/modules/exploits/windows/ftp/vermillion_ftpd_port.rb +++ b/modules/exploits/windows/ftp/vermillion_ftpd_port.rb @@ -48,7 +48,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'jduck' # metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '62163' ], diff --git a/modules/exploits/windows/ftp/warftpd_165_pass.rb b/modules/exploits/windows/ftp/warftpd_165_pass.rb index 0c291c2f41..cb20c73e7a 100644 --- a/modules/exploits/windows/ftp/warftpd_165_pass.rb +++ b/modules/exploits/windows/ftp/warftpd_165_pass.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'hdm', 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '1999-0256'], diff --git a/modules/exploits/windows/ftp/warftpd_165_user.rb b/modules/exploits/windows/ftp/warftpd_165_user.rb index 1d33490ec1..7f71cf6a31 100644 --- a/modules/exploits/windows/ftp/warftpd_165_user.rb +++ b/modules/exploits/windows/ftp/warftpd_165_user.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'Fairuzan Roslan ', 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '1999-0256'], diff --git a/modules/exploits/windows/ftp/wftpd_size.rb b/modules/exploits/windows/ftp/wftpd_size.rb index 6bfee35758..5095327188 100644 --- a/modules/exploits/windows/ftp/wftpd_size.rb +++ b/modules/exploits/windows/ftp/wftpd_size.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-4318' ], diff --git a/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb b/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb index 95e7f1aaf7..d91e271193 100644 --- a/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb +++ b/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'et', 'Reed Arvin ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'References' => [ diff --git a/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb b/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb index 5cc2d1a2d0..5bf5e94df4 100644 --- a/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb +++ b/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-4847' ], diff --git a/modules/exploits/windows/ftp/xftp_client_pwd.rb b/modules/exploits/windows/ftp/xftp_client_pwd.rb index 2f358ef4e8..f8d28343c8 100644 --- a/modules/exploits/windows/ftp/xftp_client_pwd.rb +++ b/modules/exploits/windows/ftp/xftp_client_pwd.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote 'dookie' # MSF module author ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '63968'], diff --git a/modules/exploits/windows/ftp/xlink_client.rb b/modules/exploits/windows/ftp/xlink_client.rb index a9acccff53..9cd158ecc9 100644 --- a/modules/exploits/windows/ftp/xlink_client.rb +++ b/modules/exploits/windows/ftp/xlink_client.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5792' ], diff --git a/modules/exploits/windows/ftp/xlink_server.rb b/modules/exploits/windows/ftp/xlink_server.rb index 44b177376a..3383225c63 100644 --- a/modules/exploits/windows/ftp/xlink_server.rb +++ b/modules/exploits/windows/ftp/xlink_server.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5792' ], diff --git a/modules/exploits/windows/games/mohaa_getinfo.rb b/modules/exploits/windows/games/mohaa_getinfo.rb index 507b60327d..9c26d26adc 100644 --- a/modules/exploits/windows/games/mohaa_getinfo.rb +++ b/modules/exploits/windows/games/mohaa_getinfo.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Jacopo Cervini' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0735'], diff --git a/modules/exploits/windows/games/racer_503beta5.rb b/modules/exploits/windows/games/racer_503beta5.rb index 8a6db2efd8..44f92dfc71 100644 --- a/modules/exploits/windows/games/racer_503beta5.rb +++ b/modules/exploits/windows/games/racer_503beta5.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Trancek ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4370' ], diff --git a/modules/exploits/windows/games/ut2004_secure.rb b/modules/exploits/windows/games/ut2004_secure.rb index b526b07d93..409d4c1054 100644 --- a/modules/exploits/windows/games/ut2004_secure.rb +++ b/modules/exploits/windows/games/ut2004_secure.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'stinko' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0608'], diff --git a/modules/exploits/windows/http/adobe_robohelper_authbypass.rb b/modules/exploits/windows/http/adobe_robohelper_authbypass.rb index 3ffb3808ba..579e195313 100644 --- a/modules/exploits/windows/http/adobe_robohelper_authbypass.rb +++ b/modules/exploits/windows/http/adobe_robohelper_authbypass.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => 'win', 'Privileged' => true, 'References' => diff --git a/modules/exploits/windows/http/altn_securitygateway.rb b/modules/exploits/windows/http/altn_securitygateway.rb index f1bf038a48..8b8af0cad6 100644 --- a/modules/exploits/windows/http/altn_securitygateway.rb +++ b/modules/exploits/windows/http/altn_securitygateway.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4193' ], diff --git a/modules/exploits/windows/http/altn_webadmin.rb b/modules/exploits/windows/http/altn_webadmin.rb index 1b01881a89..56ef23286f 100644 --- a/modules/exploits/windows/http/altn_webadmin.rb +++ b/modules/exploits/windows/http/altn_webadmin.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0471' ], diff --git a/modules/exploits/windows/http/amlibweb_webquerydll_app.rb b/modules/exploits/windows/http/amlibweb_webquerydll_app.rb index c8738f7731..9be7c32fe0 100644 --- a/modules/exploits/windows/http/amlibweb_webquerydll_app.rb +++ b/modules/exploits/windows/http/amlibweb_webquerydll_app.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '66814' ], diff --git a/modules/exploits/windows/http/apache_chunked.rb b/modules/exploits/windows/http/apache_chunked.rb index 5c541b1e06..efe5f2bd30 100644 --- a/modules/exploits/windows/http/apache_chunked.rb +++ b/modules/exploits/windows/http/apache_chunked.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote the server will crash. }, 'Author' => [ 'hdm', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-0392' ], diff --git a/modules/exploits/windows/http/apache_mod_rewrite_ldap.rb b/modules/exploits/windows/http/apache_mod_rewrite_ldap.rb index 747db6f52c..540ca2400b 100644 --- a/modules/exploits/windows/http/apache_mod_rewrite_ldap.rb +++ b/modules/exploits/windows/http/apache_mod_rewrite_ldap.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote only supports Windows based installations. }, 'Author' => 'patrick', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-3747' ], diff --git a/modules/exploits/windows/http/apache_modjk_overflow.rb b/modules/exploits/windows/http/apache_modjk_overflow.rb index 79a741f525..e315e6115d 100644 --- a/modules/exploits/windows/http/apache_modjk_overflow.rb +++ b/modules/exploits/windows/http/apache_modjk_overflow.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote Should work on any Win32 OS. }, 'Author' => 'Nicob ', - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'References' => [ diff --git a/modules/exploits/windows/http/badblue_ext_overflow.rb b/modules/exploits/windows/http/badblue_ext_overflow.rb index 68fe364705..b2fbfbb9aa 100644 --- a/modules/exploits/windows/http/badblue_ext_overflow.rb +++ b/modules/exploits/windows/http/badblue_ext_overflow.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'acaro ', 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0595' ], diff --git a/modules/exploits/windows/http/badblue_passthru.rb b/modules/exploits/windows/http/badblue_passthru.rb index 7f9da15538..5ecf4450c1 100644 --- a/modules/exploits/windows/http/badblue_passthru.rb +++ b/modules/exploits/windows/http/badblue_passthru.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-6377'], diff --git a/modules/exploits/windows/http/bea_weblogic_jsessionid.rb b/modules/exploits/windows/http/bea_weblogic_jsessionid.rb index 126af5afc2..ffce9c30eb 100644 --- a/modules/exploits/windows/http/bea_weblogic_jsessionid.rb +++ b/modules/exploits/windows/http/bea_weblogic_jsessionid.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote long JSESSION cookie value can lead to arbirtary code execution. }, 'Author' => 'pusscat', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5457' ], diff --git a/modules/exploits/windows/http/bea_weblogic_post_bof.rb b/modules/exploits/windows/http/bea_weblogic_post_bof.rb index 5c9eafb89f..fdf49d1a5a 100644 --- a/modules/exploits/windows/http/bea_weblogic_post_bof.rb +++ b/modules/exploits/windows/http/bea_weblogic_post_bof.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote 'KingCope', # Vulnerability Discovery and PoC 'juan vazquez', # Metasploit Module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3257' ], diff --git a/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb b/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb index 308487741b..0f41db50d6 100644 --- a/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb +++ b/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote You may have to run this twice due to timing issues with handlers. }, 'Author' => 'pusscat', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4008' ], diff --git a/modules/exploits/windows/http/belkin_bulldog.rb b/modules/exploits/windows/http/belkin_bulldog.rb index b5b5185930..10213883a9 100644 --- a/modules/exploits/windows/http/belkin_bulldog.rb +++ b/modules/exploits/windows/http/belkin_bulldog.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '54395' ], diff --git a/modules/exploits/windows/http/ca_arcserve_rpc_authbypass.rb b/modules/exploits/windows/http/ca_arcserve_rpc_authbypass.rb index d194673933..cd8ff1bd4b 100644 --- a/modules/exploits/windows/http/ca_arcserve_rpc_authbypass.rb +++ b/modules/exploits/windows/http/ca_arcserve_rpc_authbypass.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'rgod', # original public exploit ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-3011' ], diff --git a/modules/exploits/windows/http/ca_igateway_debug.rb b/modules/exploits/windows/http/ca_igateway_debug.rb index b588144822..8e87a97452 100644 --- a/modules/exploits/windows/http/ca_igateway_debug.rb +++ b/modules/exploits/windows/http/ca_igateway_debug.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'patrick', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-3190' ], diff --git a/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb b/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb index d5208a4e0b..b907a58eb6 100644 --- a/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb +++ b/modules/exploits/windows/http/ca_totaldefense_regeneratereports.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-11-134' ], diff --git a/modules/exploits/windows/http/coldfusion_fckeditor.rb b/modules/exploits/windows/http/coldfusion_fckeditor.rb index b72125e7bc..d57ed0f221 100644 --- a/modules/exploits/windows/http/coldfusion_fckeditor.rb +++ b/modules/exploits/windows/http/coldfusion_fckeditor.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => 'win', 'Privileged' => true, 'References' => diff --git a/modules/exploits/windows/http/easyftp_list.rb b/modules/exploits/windows/http/easyftp_list.rb index 1db1769ac4..3484cdf86f 100644 --- a/modules/exploits/windows/http/easyftp_list.rb +++ b/modules/exploits/windows/http/easyftp_list.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote 'ThE g0bL!N', # Original exploit [see References] 'jduck' # Metasploit re-implementation ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '66614'], diff --git a/modules/exploits/windows/http/edirectory_host.rb b/modules/exploits/windows/http/edirectory_host.rb index 3e4b07e07b..6f14a12279 100644 --- a/modules/exploits/windows/http/edirectory_host.rb +++ b/modules/exploits/windows/http/edirectory_host.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-5478'], diff --git a/modules/exploits/windows/http/edirectory_imonitor.rb b/modules/exploits/windows/http/edirectory_imonitor.rb index a695c62e7f..7d60d90283 100644 --- a/modules/exploits/windows/http/edirectory_imonitor.rb +++ b/modules/exploits/windows/http/edirectory_imonitor.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Unknown', 'Matt Olney ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2551'], diff --git a/modules/exploits/windows/http/efs_easychatserver_username.rb b/modules/exploits/windows/http/efs_easychatserver_username.rb index f9f5cb5bed..493d380937 100644 --- a/modules/exploits/windows/http/efs_easychatserver_username.rb +++ b/modules/exploits/windows/http/efs_easychatserver_username.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'LSO ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2466' ], diff --git a/modules/exploits/windows/http/fdm_auth_header.rb b/modules/exploits/windows/http/fdm_auth_header.rb index 92d88dfaf8..d65c28ed17 100644 --- a/modules/exploits/windows/http/fdm_auth_header.rb +++ b/modules/exploits/windows/http/fdm_auth_header.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0183' ], diff --git a/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb b/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb index cad27bbc43..0f62779c4e 100644 --- a/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb +++ b/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1555' ], diff --git a/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb b/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb index 7cd782a3de..81dccf14d1 100644 --- a/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb +++ b/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1554' ], diff --git a/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb b/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb index 7504a428d2..f07b7a98bb 100644 --- a/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb +++ b/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1553' ], diff --git a/modules/exploits/windows/http/hp_nnm_nnmrptconfig_nameparams.rb b/modules/exploits/windows/http/hp_nnm_nnmrptconfig_nameparams.rb index e32a92c5b8..f32b680475 100644 --- a/modules/exploits/windows/http/hp_nnm_nnmrptconfig_nameparams.rb +++ b/modules/exploits/windows/http/hp_nnm_nnmrptconfig_nameparams.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote ov.sprintf_new() is used, and gain arbitrary code execution.' }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'sinn3r', diff --git a/modules/exploits/windows/http/hp_nnm_nnmrptconfig_schdparams.rb b/modules/exploits/windows/http/hp_nnm_nnmrptconfig_schdparams.rb index 6aa0686809..1ed8e2f1e3 100644 --- a/modules/exploits/windows/http/hp_nnm_nnmrptconfig_schdparams.rb +++ b/modules/exploits/windows/http/hp_nnm_nnmrptconfig_schdparams.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote overwrite data on the stack, and gain arbitrary code execution. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => ['sinn3r'], 'References' => [ diff --git a/modules/exploits/windows/http/hp_nnm_openview5.rb b/modules/exploits/windows/http/hp_nnm_openview5.rb index c0e6cccc48..ef5984c7da 100644 --- a/modules/exploits/windows/http/hp_nnm_openview5.rb +++ b/modules/exploits/windows/http/hp_nnm_openview5.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-6204' ], diff --git a/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb b/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb index 03d92c5942..747c49f8d9 100644 --- a/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb +++ b/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4179' ], diff --git a/modules/exploits/windows/http/hp_nnm_ovas.rb b/modules/exploits/windows/http/hp_nnm_ovas.rb index dc06758a90..aca3e27935 100644 --- a/modules/exploits/windows/http/hp_nnm_ovas.rb +++ b/modules/exploits/windows/http/hp_nnm_ovas.rb @@ -41,8 +41,6 @@ class Metasploit3 < Msf::Exploit::Remote # credit where credit is due. =) 'muts' ], - - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1697' ], diff --git a/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb b/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb index 84dfed7810..319dcd6a99 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4178' ], diff --git a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb index 2159bdfbb7..8a335fd5c8 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb @@ -41,7 +41,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1964' ], diff --git a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb index 739fa456de..7f7fcca757 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb @@ -44,7 +44,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1961' ], diff --git a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb index e3b6cf238e..eed839186f 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb @@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1960' ], diff --git a/modules/exploits/windows/http/hp_nnm_snmp.rb b/modules/exploits/windows/http/hp_nnm_snmp.rb index ea9a1af4b8..763f1c9a55 100644 --- a/modules/exploits/windows/http/hp_nnm_snmp.rb +++ b/modules/exploits/windows/http/hp_nnm_snmp.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3849' ], diff --git a/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb b/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb index f30cc7dafe..3684b2119e 100644 --- a/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb +++ b/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1552' ], diff --git a/modules/exploits/windows/http/hp_nnm_toolbar_01.rb b/modules/exploits/windows/http/hp_nnm_toolbar_01.rb index 594f917dd8..c8119d6bc6 100644 --- a/modules/exploits/windows/http/hp_nnm_toolbar_01.rb +++ b/modules/exploits/windows/http/hp_nnm_toolbar_01.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0067' ], diff --git a/modules/exploits/windows/http/hp_nnm_toolbar_02.rb b/modules/exploits/windows/http/hp_nnm_toolbar_02.rb index c59b6bf76f..291048a948 100644 --- a/modules/exploits/windows/http/hp_nnm_toolbar_02.rb +++ b/modules/exploits/windows/http/hp_nnm_toolbar_02.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote against a specific build (ie. NNM 7.53_01195) }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Author' => [ 'Oren Isacson', # original discovery diff --git a/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb b/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb index 7a83bc14a5..a068d83c3f 100644 --- a/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb +++ b/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb @@ -42,7 +42,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'CVE', '2010-2703' ], diff --git a/modules/exploits/windows/http/hp_nnm_webappmon_ovjavalocale.rb b/modules/exploits/windows/http/hp_nnm_webappmon_ovjavalocale.rb index 996130113b..fe033806b8 100644 --- a/modules/exploits/windows/http/hp_nnm_webappmon_ovjavalocale.rb +++ b/modules/exploits/windows/http/hp_nnm_webappmon_ovjavalocale.rb @@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote cookie values, as well as several different CGI applications, can be used. '}, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Nahuel Riva', diff --git a/modules/exploits/windows/http/hp_openview_insight_backdoor.rb b/modules/exploits/windows/http/hp_openview_insight_backdoor.rb index 32e7755964..e2e1f420ca 100644 --- a/modules/exploits/windows/http/hp_openview_insight_backdoor.rb +++ b/modules/exploits/windows/http/hp_openview_insight_backdoor.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => 'win', 'Privileged' => true, 'References' => diff --git a/modules/exploits/windows/http/hp_power_manager_filename.rb b/modules/exploits/windows/http/hp_power_manager_filename.rb index 9019ba3260..f40c8d829c 100644 --- a/modules/exploits/windows/http/hp_power_manager_filename.rb +++ b/modules/exploits/windows/http/hp_power_manager_filename.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote # Metasploit fu 'sinn3r' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3999' ], diff --git a/modules/exploits/windows/http/hp_power_manager_login.rb b/modules/exploits/windows/http/hp_power_manager_login.rb index 2d16879fe7..58750f178b 100644 --- a/modules/exploits/windows/http/hp_power_manager_login.rb +++ b/modules/exploits/windows/http/hp_power_manager_login.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'sinn3r' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2685' ], diff --git a/modules/exploits/windows/http/httpdx_handlepeer.rb b/modules/exploits/windows/http/httpdx_handlepeer.rb index a7003b4b30..14a836a9ee 100644 --- a/modules/exploits/windows/http/httpdx_handlepeer.rb +++ b/modules/exploits/windows/http/httpdx_handlepeer.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Trancer ', # Metasploit implementation 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '58714' ], diff --git a/modules/exploits/windows/http/httpdx_tolog_format.rb b/modules/exploits/windows/http/httpdx_tolog_format.rb index 4354b8f855..81b10b1dd2 100644 --- a/modules/exploits/windows/http/httpdx_tolog_format.rb +++ b/modules/exploits/windows/http/httpdx_tolog_format.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'jduck' # original discovery and metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4769' ], diff --git a/modules/exploits/windows/http/ia_webmail.rb b/modules/exploits/windows/http/ia_webmail.rb index 673a36f1d4..af0e9b3ba6 100644 --- a/modules/exploits/windows/http/ia_webmail.rb +++ b/modules/exploits/windows/http/ia_webmail.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote this time. }, 'Author' => [ 'hdm' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-1192'], diff --git a/modules/exploits/windows/http/ibm_tivoli_endpoint_bof.rb b/modules/exploits/windows/http/ibm_tivoli_endpoint_bof.rb index 972ccaf46d..f13259e085 100644 --- a/modules/exploits/windows/http/ibm_tivoli_endpoint_bof.rb +++ b/modules/exploits/windows/http/ibm_tivoli_endpoint_bof.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Jeremy Brown <0xjbrown[at]gmail.com>', # original public exploit ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1220'], diff --git a/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb b/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb index fca332c7d8..7f9fb8eedf 100644 --- a/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb +++ b/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'toto', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1868'], diff --git a/modules/exploits/windows/http/ibm_tsm_cad_header.rb b/modules/exploits/windows/http/ibm_tsm_cad_header.rb index ed04250e0a..2493b14183 100644 --- a/modules/exploits/windows/http/ibm_tsm_cad_header.rb +++ b/modules/exploits/windows/http/ibm_tsm_cad_header.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4880' ], diff --git a/modules/exploits/windows/http/icecast_header.rb b/modules/exploits/windows/http/icecast_header.rb index b4007c3a36..676368f865 100644 --- a/modules/exploits/windows/http/icecast_header.rb +++ b/modules/exploits/windows/http/icecast_header.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'spoonm', 'Luigi Auriemma ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1561'], diff --git a/modules/exploits/windows/http/integard_password_bof.rb b/modules/exploits/windows/http/integard_password_bof.rb index 731d39d40b..bd9b791fee 100644 --- a/modules/exploits/windows/http/integard_password_bof.rb +++ b/modules/exploits/windows/http/integard_password_bof.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # fleshed out module from advisory ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '67909'], diff --git a/modules/exploits/windows/http/intersystems_cache.rb b/modules/exploits/windows/http/intersystems_cache.rb index c3c4359e16..d4997cd6ea 100644 --- a/modules/exploits/windows/http/intersystems_cache.rb +++ b/modules/exploits/windows/http/intersystems_cache.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '60549' ], diff --git a/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb b/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb index eb3fa9cad7..fdb74f77cf 100644 --- a/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb +++ b/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2004-0798'], diff --git a/modules/exploits/windows/http/kolibri_http.rb b/modules/exploits/windows/http/kolibri_http.rb index 34e6f6098c..c73553eaa3 100644 --- a/modules/exploits/windows/http/kolibri_http.rb +++ b/modules/exploits/windows/http/kolibri_http.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'TheLeader', # original exploit 'sinn3r', # msf commit ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-2268' ], diff --git a/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb b/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb index 31261e648b..3a109c16ad 100644 --- a/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb +++ b/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Andrea Micalizzi', # aka rgod - Vulnerability Discovery and PoC 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'Platform' => 'win', 'References' => [ diff --git a/modules/exploits/windows/http/mailenable_auth_header.rb b/modules/exploits/windows/http/mailenable_auth_header.rb index 52572f260c..3640f8212f 100644 --- a/modules/exploits/windows/http/mailenable_auth_header.rb +++ b/modules/exploits/windows/http/mailenable_auth_header.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'David Maciejak ', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-1348'], diff --git a/modules/exploits/windows/http/manageengine_apps_mngr.rb b/modules/exploits/windows/http/manageengine_apps_mngr.rb index a4568b1ef2..1275f028a6 100644 --- a/modules/exploits/windows/http/manageengine_apps_mngr.rb +++ b/modules/exploits/windows/http/manageengine_apps_mngr.rb @@ -16,7 +16,6 @@ class Metasploit3 < Msf::Exploit::Remote def initialize super( 'Name' => 'ManageEngine Applications Manager Authenticated Code Execution', - 'Version' => '$Revision$', 'Description' => %q{ This module logs into the Manage Engine Appplications Manager to upload a payload to the file system and a batch script that executes the payload. }, diff --git a/modules/exploits/windows/http/maxdb_webdbm_database.rb b/modules/exploits/windows/http/maxdb_webdbm_database.rb index 8a087abc95..c50598d2dc 100644 --- a/modules/exploits/windows/http/maxdb_webdbm_database.rb +++ b/modules/exploits/windows/http/maxdb_webdbm_database.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-4305'], diff --git a/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb b/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb index 77053cac03..b2ee14cb74 100644 --- a/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb +++ b/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0684'], diff --git a/modules/exploits/windows/http/mcafee_epolicy_source.rb b/modules/exploits/windows/http/mcafee_epolicy_source.rb index dbb20255e9..8f0ab99c8f 100644 --- a/modules/exploits/windows/http/mcafee_epolicy_source.rb +++ b/modules/exploits/windows/http/mcafee_epolicy_source.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5156' ], diff --git a/modules/exploits/windows/http/mdaemon_worldclient_form2raw.rb b/modules/exploits/windows/http/mdaemon_worldclient_form2raw.rb index d5fe97d29e..eb44e32052 100644 --- a/modules/exploits/windows/http/mdaemon_worldclient_form2raw.rb +++ b/modules/exploits/windows/http/mdaemon_worldclient_form2raw.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-1200' ], diff --git a/modules/exploits/windows/http/minishare_get_overflow.rb b/modules/exploits/windows/http/minishare_get_overflow.rb index 1f1c538f34..6c669086d4 100644 --- a/modules/exploits/windows/http/minishare_get_overflow.rb +++ b/modules/exploits/windows/http/minishare_get_overflow.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'acaro ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2271'], diff --git a/modules/exploits/windows/http/navicopa_get_overflow.rb b/modules/exploits/windows/http/navicopa_get_overflow.rb index d7fe88e753..54e20108dd 100644 --- a/modules/exploits/windows/http/navicopa_get_overflow.rb +++ b/modules/exploits/windows/http/navicopa_get_overflow.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5112' ], diff --git a/modules/exploits/windows/http/novell_imanager_upload.rb b/modules/exploits/windows/http/novell_imanager_upload.rb index 8b194091b6..4534925e48 100644 --- a/modules/exploits/windows/http/novell_imanager_upload.rb +++ b/modules/exploits/windows/http/novell_imanager_upload.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'Privileged' => true, 'References' => diff --git a/modules/exploits/windows/http/novell_messenger_acceptlang.rb b/modules/exploits/windows/http/novell_messenger_acceptlang.rb index aa7ff30c84..69da703f12 100644 --- a/modules/exploits/windows/http/novell_messenger_acceptlang.rb +++ b/modules/exploits/windows/http/novell_messenger_acceptlang.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-0992'], diff --git a/modules/exploits/windows/http/nowsms.rb b/modules/exploits/windows/http/nowsms.rb index be9e1560a8..51ab88bf30 100644 --- a/modules/exploits/windows/http/nowsms.rb +++ b/modules/exploits/windows/http/nowsms.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0871' ], diff --git a/modules/exploits/windows/http/oracle9i_xdb_pass.rb b/modules/exploits/windows/http/oracle9i_xdb_pass.rb index 8c457187db..356def0db8 100644 --- a/modules/exploits/windows/http/oracle9i_xdb_pass.rb +++ b/modules/exploits/windows/http/oracle9i_xdb_pass.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2003-0727'], diff --git a/modules/exploits/windows/http/osb_uname_jlist.rb b/modules/exploits/windows/http/osb_uname_jlist.rb index 0cb35a931a..713a394f83 100644 --- a/modules/exploits/windows/http/osb_uname_jlist.rb +++ b/modules/exploits/windows/http/osb_uname_jlist.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-118' ], diff --git a/modules/exploits/windows/http/peercast_url.rb b/modules/exploits/windows/http/peercast_url.rb index c5ec42c939..901e2c7aa6 100644 --- a/modules/exploits/windows/http/peercast_url.rb +++ b/modules/exploits/windows/http/peercast_url.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-1148'], diff --git a/modules/exploits/windows/http/php_apache_request_headers_bof.rb b/modules/exploits/windows/http/php_apache_request_headers_bof.rb index f0c9df5954..bd9b5e8274 100644 --- a/modules/exploits/windows/http/php_apache_request_headers_bof.rb +++ b/modules/exploits/windows/http/php_apache_request_headers_bof.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'juan vazquez', # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-2329'], diff --git a/modules/exploits/windows/http/privatewire_gateway.rb b/modules/exploits/windows/http/privatewire_gateway.rb index 84d0166c51..af3dbe1767 100644 --- a/modules/exploits/windows/http/privatewire_gateway.rb +++ b/modules/exploits/windows/http/privatewire_gateway.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'Michael Thumann ', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3252'], diff --git a/modules/exploits/windows/http/psoproxy91_overflow.rb b/modules/exploits/windows/http/psoproxy91_overflow.rb index b7b0657a9b..c8d4707b0f 100644 --- a/modules/exploits/windows/http/psoproxy91_overflow.rb +++ b/modules/exploits/windows/http/psoproxy91_overflow.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0313' ], diff --git a/modules/exploits/windows/http/sambar6_search_results.rb b/modules/exploits/windows/http/sambar6_search_results.rb index c4dea8f221..6201d62ae6 100644 --- a/modules/exploits/windows/http/sambar6_search_results.rb +++ b/modules/exploits/windows/http/sambar6_search_results.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2086' ], diff --git a/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb b/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb index 21a8630322..a188653fad 100644 --- a/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb +++ b/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb @@ -19,7 +19,6 @@ class Metasploit4 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, 'Name' => 'SAP Management Console OSExecute Payload Execution', - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'Author' => [ 'Chris John Riley' ], 'Description' => %q{ diff --git a/modules/exploits/windows/http/sapdb_webtools.rb b/modules/exploits/windows/http/sapdb_webtools.rb index 8dee7523e8..7490a3e1b8 100644 --- a/modules/exploits/windows/http/sapdb_webtools.rb +++ b/modules/exploits/windows/http/sapdb_webtools.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3614' ], diff --git a/modules/exploits/windows/http/savant_31_overflow.rb b/modules/exploits/windows/http/savant_31_overflow.rb index e045c16049..7f7cf7ef55 100644 --- a/modules/exploits/windows/http/savant_31_overflow.rb +++ b/modules/exploits/windows/http/savant_31_overflow.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-1120' ], diff --git a/modules/exploits/windows/http/servu_session_cookie.rb b/modules/exploits/windows/http/servu_session_cookie.rb index 993cfbaa58..68ae6a81f2 100644 --- a/modules/exploits/windows/http/servu_session_cookie.rb +++ b/modules/exploits/windows/http/servu_session_cookie.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-4006' ], # unsure diff --git a/modules/exploits/windows/http/shoutcast_format.rb b/modules/exploits/windows/http/shoutcast_format.rb index 6bb065a542..06e4dffed2 100644 --- a/modules/exploits/windows/http/shoutcast_format.rb +++ b/modules/exploits/windows/http/shoutcast_format.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'mandragore[at]gmail.com'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1373'], diff --git a/modules/exploits/windows/http/shttpd_post.rb b/modules/exploits/windows/http/shttpd_post.rb index debb76277e..1ccd31c198 100644 --- a/modules/exploits/windows/http/shttpd_post.rb +++ b/modules/exploits/windows/http/shttpd_post.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'LMH ', 'hdm', 'skOd'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5216'], diff --git a/modules/exploits/windows/http/steamcast_useragent.rb b/modules/exploits/windows/http/steamcast_useragent.rb index 1fa617b811..961b372779 100644 --- a/modules/exploits/windows/http/steamcast_useragent.rb +++ b/modules/exploits/windows/http/steamcast_useragent.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'patrick' # Added references and check code. Default target to XP. ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0550' ], diff --git a/modules/exploits/windows/http/sybase_easerver.rb b/modules/exploits/windows/http/sybase_easerver.rb index 15f2cae734..69e353607a 100644 --- a/modules/exploits/windows/http/sybase_easerver.rb +++ b/modules/exploits/windows/http/sybase_easerver.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Unknown' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2297' ], diff --git a/modules/exploits/windows/http/trackercam_phparg_overflow.rb b/modules/exploits/windows/http/trackercam_phparg_overflow.rb index a870f8fd57..67d66ff07c 100644 --- a/modules/exploits/windows/http/trackercam_phparg_overflow.rb +++ b/modules/exploits/windows/http/trackercam_phparg_overflow.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0478'], diff --git a/modules/exploits/windows/http/trendmicro_officescan.rb b/modules/exploits/windows/http/trendmicro_officescan.rb index 7416360913..65ad88b17e 100644 --- a/modules/exploits/windows/http/trendmicro_officescan.rb +++ b/modules/exploits/windows/http/trendmicro_officescan.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'toto' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1365' ], diff --git a/modules/exploits/windows/http/webster_http.rb b/modules/exploits/windows/http/webster_http.rb index dcdb290552..f7cb064f2b 100644 --- a/modules/exploits/windows/http/webster_http.rb +++ b/modules/exploits/windows/http/webster_http.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote Simple HTTP-based Server Using MFC and Windows Sockets". }, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-2268' ], diff --git a/modules/exploits/windows/http/xampp_webdav_upload_php.rb b/modules/exploits/windows/http/xampp_webdav_upload_php.rb index abdedb9313..5c92488218 100644 --- a/modules/exploits/windows/http/xampp_webdav_upload_php.rb +++ b/modules/exploits/windows/http/xampp_webdav_upload_php.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote execute it. }, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => 'php', 'Arch' => ARCH_PHP, 'Targets' => diff --git a/modules/exploits/windows/http/xitami_if_mod_since.rb b/modules/exploits/windows/http/xitami_if_mod_since.rb index 49d3409e6e..b44e0534c2 100644 --- a/modules/exploits/windows/http/xitami_if_mod_since.rb +++ b/modules/exploits/windows/http/xitami_if_mod_since.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'patrick', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5067' ], diff --git a/modules/exploits/windows/http/zenworks_uploadservlet.rb b/modules/exploits/windows/http/zenworks_uploadservlet.rb index 1d3df9adeb..e59e00093f 100644 --- a/modules/exploits/windows/http/zenworks_uploadservlet.rb +++ b/modules/exploits/windows/http/zenworks_uploadservlet.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '63412' ], diff --git a/modules/exploits/windows/iis/iis_webdav_upload_asp.rb b/modules/exploits/windows/iis/iis_webdav_upload_asp.rb index d382d657bd..eddda7b76b 100644 --- a/modules/exploits/windows/iis/iis_webdav_upload_asp.rb +++ b/modules/exploits/windows/iis/iis_webdav_upload_asp.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote script using a WebDAV PUT request. }, 'Author' => 'hdm', - 'Version' => '$Revision$', 'Platform' => 'win', 'References' => [ diff --git a/modules/exploits/windows/iis/ms01_023_printer.rb b/modules/exploits/windows/iis/ms01_023_printer.rb index c705c2b672..4492bfc7da 100644 --- a/modules/exploits/windows/iis/ms01_023_printer.rb +++ b/modules/exploits/windows/iis/ms01_023_printer.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0241'], diff --git a/modules/exploits/windows/iis/ms01_026_dbldecode.rb b/modules/exploits/windows/iis/ms01_026_dbldecode.rb index 27b884a3dc..61d34f5695 100644 --- a/modules/exploits/windows/iis/ms01_026_dbldecode.rb +++ b/modules/exploits/windows/iis/ms01_026_dbldecode.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0333' ], diff --git a/modules/exploits/windows/iis/ms01_033_idq.rb b/modules/exploits/windows/iis/ms01_033_idq.rb index 0101723deb..40eab87f70 100644 --- a/modules/exploits/windows/iis/ms01_033_idq.rb +++ b/modules/exploits/windows/iis/ms01_033_idq.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0500'], diff --git a/modules/exploits/windows/iis/ms02_018_htr.rb b/modules/exploits/windows/iis/ms02_018_htr.rb index 10081716d7..38068e8e00 100644 --- a/modules/exploits/windows/iis/ms02_018_htr.rb +++ b/modules/exploits/windows/iis/ms02_018_htr.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'stinko' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '1999-0874'], diff --git a/modules/exploits/windows/iis/ms02_065_msadc.rb b/modules/exploits/windows/iis/ms02_065_msadc.rb index ff7abe1c7b..5be76c72cb 100644 --- a/modules/exploits/windows/iis/ms02_065_msadc.rb +++ b/modules/exploits/windows/iis/ms02_065_msadc.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote Access Components (MDAC) 2.1 through 2.6 are known to be vulnerable. }, 'Author' => 'patrick', - 'Version' => '$Revision$', 'Platform' => 'win', 'References' => [ diff --git a/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb b/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb index ba93456d36..11afa8a7f6 100644 --- a/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb +++ b/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0109'], diff --git a/modules/exploits/windows/imap/eudora_list.rb b/modules/exploits/windows/imap/eudora_list.rb index 9115e83fba..5c5d6ba4ee 100644 --- a/modules/exploits/windows/imap/eudora_list.rb +++ b/modules/exploits/windows/imap/eudora_list.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-4267'], diff --git a/modules/exploits/windows/imap/imail_delete.rb b/modules/exploits/windows/imap/imail_delete.rb index 46a8bced66..c431076529 100644 --- a/modules/exploits/windows/imap/imail_delete.rb +++ b/modules/exploits/windows/imap/imail_delete.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'spoonm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1520'], diff --git a/modules/exploits/windows/imap/ipswitch_search.rb b/modules/exploits/windows/imap/ipswitch_search.rb index 9cfbdf6a97..553a449dcf 100644 --- a/modules/exploits/windows/imap/ipswitch_search.rb +++ b/modules/exploits/windows/imap/ipswitch_search.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3925' ], diff --git a/modules/exploits/windows/imap/mailenable_login.rb b/modules/exploits/windows/imap/mailenable_login.rb index a150e7bd09..983b8abafb 100644 --- a/modules/exploits/windows/imap/mailenable_login.rb +++ b/modules/exploits/windows/imap/mailenable_login.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6423'], diff --git a/modules/exploits/windows/imap/mailenable_status.rb b/modules/exploits/windows/imap/mailenable_status.rb index 4063215b0a..1b62b7ceea 100644 --- a/modules/exploits/windows/imap/mailenable_status.rb +++ b/modules/exploits/windows/imap/mailenable_status.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2278'], diff --git a/modules/exploits/windows/imap/mailenable_w3c_select.rb b/modules/exploits/windows/imap/mailenable_w3c_select.rb index 2357a3da12..f601bb7911 100644 --- a/modules/exploits/windows/imap/mailenable_w3c_select.rb +++ b/modules/exploits/windows/imap/mailenable_w3c_select.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-3155'], diff --git a/modules/exploits/windows/imap/mdaemon_cram_md5.rb b/modules/exploits/windows/imap/mdaemon_cram_md5.rb index cdd6013719..8b7996b942 100644 --- a/modules/exploits/windows/imap/mdaemon_cram_md5.rb +++ b/modules/exploits/windows/imap/mdaemon_cram_md5.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Unknown' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1520'], diff --git a/modules/exploits/windows/imap/mdaemon_fetch.rb b/modules/exploits/windows/imap/mdaemon_fetch.rb index e5f6746990..d556e82327 100644 --- a/modules/exploits/windows/imap/mdaemon_fetch.rb +++ b/modules/exploits/windows/imap/mdaemon_fetch.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Jacopo Cervini', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1358' ], diff --git a/modules/exploits/windows/imap/mercur_imap_select_overflow.rb b/modules/exploits/windows/imap/mercur_imap_select_overflow.rb index 1e70cfa290..be198f3fe8 100644 --- a/modules/exploits/windows/imap/mercur_imap_select_overflow.rb +++ b/modules/exploits/windows/imap/mercur_imap_select_overflow.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Jacopo Cervini ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-1255' ], diff --git a/modules/exploits/windows/imap/mercur_login.rb b/modules/exploits/windows/imap/mercur_login.rb index 67d36aa207..be1cf73956 100644 --- a/modules/exploits/windows/imap/mercur_login.rb +++ b/modules/exploits/windows/imap/mercur_login.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-1255' ], diff --git a/modules/exploits/windows/imap/mercury_login.rb b/modules/exploits/windows/imap/mercury_login.rb index 163eb31c2e..09818cda0d 100644 --- a/modules/exploits/windows/imap/mercury_login.rb +++ b/modules/exploits/windows/imap/mercury_login.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1373' ], diff --git a/modules/exploits/windows/imap/mercury_rename.rb b/modules/exploits/windows/imap/mercury_rename.rb index 49fb6adc9f..04a7344f06 100644 --- a/modules/exploits/windows/imap/mercury_rename.rb +++ b/modules/exploits/windows/imap/mercury_rename.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1211'], diff --git a/modules/exploits/windows/imap/novell_netmail_append.rb b/modules/exploits/windows/imap/novell_netmail_append.rb index 31e0eb6dfb..cd27b1dace 100644 --- a/modules/exploits/windows/imap/novell_netmail_append.rb +++ b/modules/exploits/windows/imap/novell_netmail_append.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6425' ], diff --git a/modules/exploits/windows/imap/novell_netmail_auth.rb b/modules/exploits/windows/imap/novell_netmail_auth.rb index 62c81596fc..1fe620698a 100644 --- a/modules/exploits/windows/imap/novell_netmail_auth.rb +++ b/modules/exploits/windows/imap/novell_netmail_auth.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '55175' ], diff --git a/modules/exploits/windows/imap/novell_netmail_status.rb b/modules/exploits/windows/imap/novell_netmail_status.rb index 828cd1dc59..5ce9115ce9 100644 --- a/modules/exploits/windows/imap/novell_netmail_status.rb +++ b/modules/exploits/windows/imap/novell_netmail_status.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-3314' ], diff --git a/modules/exploits/windows/imap/novell_netmail_subscribe.rb b/modules/exploits/windows/imap/novell_netmail_subscribe.rb index 39a85da1e4..47ad522926 100644 --- a/modules/exploits/windows/imap/novell_netmail_subscribe.rb +++ b/modules/exploits/windows/imap/novell_netmail_subscribe.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6761' ], diff --git a/modules/exploits/windows/isapi/ms00_094_pbserver.rb b/modules/exploits/windows/isapi/ms00_094_pbserver.rb index 73b514bde3..96ff3ecb81 100644 --- a/modules/exploits/windows/isapi/ms00_094_pbserver.rb +++ b/modules/exploits/windows/isapi/ms00_094_pbserver.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2000-1089' ], diff --git a/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb b/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb index 618a48919f..5d32493e88 100644 --- a/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb +++ b/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0349'], diff --git a/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb b/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb index 1671bbb06e..05c738419f 100644 --- a/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb +++ b/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0822'], diff --git a/modules/exploits/windows/isapi/rsa_webagent_redirect.rb b/modules/exploits/windows/isapi/rsa_webagent_redirect.rb index 48813d0b73..7dc3d2682a 100644 --- a/modules/exploits/windows/isapi/rsa_webagent_redirect.rb +++ b/modules/exploits/windows/isapi/rsa_webagent_redirect.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-4734'], diff --git a/modules/exploits/windows/isapi/w3who_query.rb b/modules/exploits/windows/isapi/w3who_query.rb index 22208a64f5..03c4a73a8c 100644 --- a/modules/exploits/windows/isapi/w3who_query.rb +++ b/modules/exploits/windows/isapi/w3who_query.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1134' ], diff --git a/modules/exploits/windows/ldap/imail_thc.rb b/modules/exploits/windows/ldap/imail_thc.rb index d965ae8a98..49a3f72e5f 100644 --- a/modules/exploits/windows/ldap/imail_thc.rb +++ b/modules/exploits/windows/ldap/imail_thc.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0297'], diff --git a/modules/exploits/windows/ldap/pgp_keyserver7.rb b/modules/exploits/windows/ldap/pgp_keyserver7.rb index 1b3e2f3afd..c101dd3cd1 100644 --- a/modules/exploits/windows/ldap/pgp_keyserver7.rb +++ b/modules/exploits/windows/ldap/pgp_keyserver7.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-1320' ], diff --git a/modules/exploits/windows/license/calicclnt_getconfig.rb b/modules/exploits/windows/license/calicclnt_getconfig.rb index 3e1f5ddde8..dd5d1ab49f 100644 --- a/modules/exploits/windows/license/calicclnt_getconfig.rb +++ b/modules/exploits/windows/license/calicclnt_getconfig.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote 'patrick', # msf v3 port :) ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0581' ], diff --git a/modules/exploits/windows/license/calicserv_getconfig.rb b/modules/exploits/windows/license/calicserv_getconfig.rb index ff66d5bb22..42f5884be2 100644 --- a/modules/exploits/windows/license/calicserv_getconfig.rb +++ b/modules/exploits/windows/license/calicserv_getconfig.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'patrick', # msf v3 port :) ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0581' ], diff --git a/modules/exploits/windows/license/sentinel_lm7_udp.rb b/modules/exploits/windows/license/sentinel_lm7_udp.rb index a03cc24c8d..71277195b1 100644 --- a/modules/exploits/windows/license/sentinel_lm7_udp.rb +++ b/modules/exploits/windows/license/sentinel_lm7_udp.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0353'], diff --git a/modules/exploits/windows/local/ask.rb b/modules/exploits/windows/local/ask.rb index 6dfbd3edef..1fcbdd7574 100644 --- a/modules/exploits/windows/local/ask.rb +++ b/modules/exploits/windows/local/ask.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Local }, 'License' => MSF_LICENSE, 'Author' => [ 'mubix' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'Targets' => [ [ 'Windows', {} ] ], diff --git a/modules/exploits/windows/local/bypassuac.rb b/modules/exploits/windows/local/bypassuac.rb index 80d0c57e2d..62717522be 100644 --- a/modules/exploits/windows/local/bypassuac.rb +++ b/modules/exploits/windows/local/bypassuac.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Local 'mitnick', 'mubix' # Port to local exploit ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'Targets' => [ [ 'Windows', {} ] ], diff --git a/modules/exploits/windows/local/current_user_psexec.rb b/modules/exploits/windows/local/current_user_psexec.rb index 5a782a2382..8ebed8a823 100644 --- a/modules/exploits/windows/local/current_user_psexec.rb +++ b/modules/exploits/windows/local/current_user_psexec.rb @@ -45,7 +45,6 @@ class Metasploit3 < Msf::Exploit::Local [ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ] ], 'DisclosureDate' => 'Jan 01 1999', - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'Targets' => [ [ 'Universal', {} ] ], diff --git a/modules/exploits/windows/local/ms10_092_schelevator.rb b/modules/exploits/windows/local/ms10_092_schelevator.rb index 476a16c804..27ae82b616 100644 --- a/modules/exploits/windows/local/ms10_092_schelevator.rb +++ b/modules/exploits/windows/local/ms10_092_schelevator.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Local }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'Arch' => [ ARCH_X86, ARCH_X86_64 ], 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], diff --git a/modules/exploits/windows/lotus/domino_http_accept_language.rb b/modules/exploits/windows/lotus/domino_http_accept_language.rb index c643d11a54..fb92308fcd 100644 --- a/modules/exploits/windows/lotus/domino_http_accept_language.rb +++ b/modules/exploits/windows/lotus/domino_http_accept_language.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Fairuzan Roslan ', '' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-2240'], diff --git a/modules/exploits/windows/lotus/domino_icalendar_organizer.rb b/modules/exploits/windows/lotus/domino_icalendar_organizer.rb index ebd271ec18..a032716470 100644 --- a/modules/exploits/windows/lotus/domino_icalendar_organizer.rb +++ b/modules/exploits/windows/lotus/domino_icalendar_organizer.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote is needed. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'A. Plaskett', #Initial discovery, poc diff --git a/modules/exploits/windows/lotus/domino_sametime_stmux.rb b/modules/exploits/windows/lotus/domino_sametime_stmux.rb index 99f6fcb10d..d5cc79a740 100644 --- a/modules/exploits/windows/lotus/domino_sametime_stmux.rb +++ b/modules/exploits/windows/lotus/domino_sametime_stmux.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick', 'riaf ' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2499' ], diff --git a/modules/exploits/windows/lotus/lotusnotes_lzh.rb b/modules/exploits/windows/lotus/lotusnotes_lzh.rb index 0a4fc9b663..574f73c334 100644 --- a/modules/exploits/windows/lotus/lotusnotes_lzh.rb +++ b/modules/exploits/windows/lotus/lotusnotes_lzh.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'binaryhouse.net', # original discovery 'alino <26alino[at]gmail.com>', # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-1213'], diff --git a/modules/exploits/windows/lpd/hummingbird_exceed.rb b/modules/exploits/windows/lpd/hummingbird_exceed.rb index 8f74437eb7..4705b6dc19 100644 --- a/modules/exploits/windows/lpd/hummingbird_exceed.rb +++ b/modules/exploits/windows/lpd/hummingbird_exceed.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-1815'], diff --git a/modules/exploits/windows/lpd/niprint.rb b/modules/exploits/windows/lpd/niprint.rb index 56a2e8a358..d23d95f924 100644 --- a/modules/exploits/windows/lpd/niprint.rb +++ b/modules/exploits/windows/lpd/niprint.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2003-1141'], diff --git a/modules/exploits/windows/lpd/saplpd.rb b/modules/exploits/windows/lpd/saplpd.rb index a9d17ed2cc..e4e8f02a47 100644 --- a/modules/exploits/windows/lpd/saplpd.rb +++ b/modules/exploits/windows/lpd/saplpd.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0621' ], diff --git a/modules/exploits/windows/lpd/wincomlpd_admin.rb b/modules/exploits/windows/lpd/wincomlpd_admin.rb index d900821c7f..178f8ec0ad 100644 --- a/modules/exploits/windows/lpd/wincomlpd_admin.rb +++ b/modules/exploits/windows/lpd/wincomlpd_admin.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-5159'], diff --git a/modules/exploits/windows/misc/agentxpp_receive_agentx.rb b/modules/exploits/windows/misc/agentxpp_receive_agentx.rb index fab6efe21c..0471f4f5ab 100644 --- a/modules/exploits/windows/misc/agentxpp_receive_agentx.rb +++ b/modules/exploits/windows/misc/agentxpp_receive_agentx.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1318' ], diff --git a/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb b/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb index fa53326a64..7f0c4bdd50 100644 --- a/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb +++ b/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-6166' ], diff --git a/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb b/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb index af0bddd24d..d4e276684b 100644 --- a/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb +++ b/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote Credit to Luigi Auriemma }, 'Author' => 'Jacopo Cervini', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1491' ], diff --git a/modules/exploits/windows/misc/bakbone_netvault_heap.rb b/modules/exploits/windows/misc/bakbone_netvault_heap.rb index ae23ec77aa..0ff8baa75e 100644 --- a/modules/exploits/windows/misc/bakbone_netvault_heap.rb +++ b/modules/exploits/windows/misc/bakbone_netvault_heap.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote code written by nolimit and BuzzDee. }, 'Author' => [ 'hdm', '' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-1009'], diff --git a/modules/exploits/windows/misc/bcaaa_bof.rb b/modules/exploits/windows/misc/bcaaa_bof.rb index 763fee541c..f49e07af79 100644 --- a/modules/exploits/windows/misc/bcaaa_bof.rb +++ b/modules/exploits/windows/misc/bcaaa_bof.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote ATTEMPTS option. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Paul Harrington', # Initial discovery and PoC diff --git a/modules/exploits/windows/misc/bigant_server.rb b/modules/exploits/windows/misc/bigant_server.rb index 0daaef40d2..d898dfb8b7 100644 --- a/modules/exploits/windows/misc/bigant_server.rb +++ b/modules/exploits/windows/misc/bigant_server.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1914' ], diff --git a/modules/exploits/windows/misc/bigant_server_250.rb b/modules/exploits/windows/misc/bigant_server_250.rb index 07a2c4faf3..5cbbbf4d35 100644 --- a/modules/exploits/windows/misc/bigant_server_250.rb +++ b/modules/exploits/windows/misc/bigant_server_250.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Dr_IDE ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # It's not clear if these are correct - there was a fix for diff --git a/modules/exploits/windows/misc/bigant_server_usv.rb b/modules/exploits/windows/misc/bigant_server_usv.rb index 92066c6617..e46d44f7b3 100644 --- a/modules/exploits/windows/misc/bigant_server_usv.rb +++ b/modules/exploits/windows/misc/bigant_server_usv.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '61386' ], diff --git a/modules/exploits/windows/misc/bomberclone_overflow.rb b/modules/exploits/windows/misc/bomberclone_overflow.rb index d56ceb8b12..b02341bf7d 100644 --- a/modules/exploits/windows/misc/bomberclone_overflow.rb +++ b/modules/exploits/windows/misc/bomberclone_overflow.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote The shellcode is exec ONLY when someone try to close bomberclone. }, 'Author' => 'Jacopo Cervini ', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-0460'], diff --git a/modules/exploits/windows/misc/bopup_comm.rb b/modules/exploits/windows/misc/bopup_comm.rb index f6702d233c..bd17f8fc02 100644 --- a/modules/exploits/windows/misc/bopup_comm.rb +++ b/modules/exploits/windows/misc/bopup_comm.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2227' ], diff --git a/modules/exploits/windows/misc/borland_interbase.rb b/modules/exploits/windows/misc/borland_interbase.rb index 33b38a51d1..d28f63b713 100644 --- a/modules/exploits/windows/misc/borland_interbase.rb +++ b/modules/exploits/windows/misc/borland_interbase.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote attacker may be able to execute arbitrary code. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3566' ], diff --git a/modules/exploits/windows/misc/borland_starteam.rb b/modules/exploits/windows/misc/borland_starteam.rb index 389f7a4eb0..fb79780c22 100644 --- a/modules/exploits/windows/misc/borland_starteam.rb +++ b/modules/exploits/windows/misc/borland_starteam.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote able to execute arbitrary code. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0311' ], diff --git a/modules/exploits/windows/misc/citrix_streamprocess.rb b/modules/exploits/windows/misc/citrix_streamprocess.rb index 884a89f18c..27022da947 100644 --- a/modules/exploits/windows/misc/citrix_streamprocess.rb +++ b/modules/exploits/windows/misc/citrix_streamprocess.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'mog', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '70597'], diff --git a/modules/exploits/windows/misc/citrix_streamprocess_data_msg.rb b/modules/exploits/windows/misc/citrix_streamprocess_data_msg.rb index 9265d98094..e0715c8038 100644 --- a/modules/exploits/windows/misc/citrix_streamprocess_data_msg.rb +++ b/modules/exploits/windows/misc/citrix_streamprocess_data_msg.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'AbdulAziz Hariri', # Initial discovery via ZDI 'alino <26alino[at]gmail.com>' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '75780'], diff --git a/modules/exploits/windows/misc/citrix_streamprocess_get_boot_record_request.rb b/modules/exploits/windows/misc/citrix_streamprocess_get_boot_record_request.rb index 2dc4ce226a..9301a5ffd4 100644 --- a/modules/exploits/windows/misc/citrix_streamprocess_get_boot_record_request.rb +++ b/modules/exploits/windows/misc/citrix_streamprocess_get_boot_record_request.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'alino <26alino[at]gmail.com>', # citrix_streamprocess_data_msg author 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '75780'], diff --git a/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb b/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb index 33f13c20a2..3505429735 100644 --- a/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb +++ b/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'alino <26alino[at]gmail.com>', # citrix_streamprocess_data_msg author 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '75780'], diff --git a/modules/exploits/windows/misc/citrix_streamprocess_get_objects.rb b/modules/exploits/windows/misc/citrix_streamprocess_get_objects.rb index bb92d02b25..e10c61c72c 100644 --- a/modules/exploits/windows/misc/citrix_streamprocess_get_objects.rb +++ b/modules/exploits/windows/misc/citrix_streamprocess_get_objects.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'alino <26alino[at]gmail.com>', # citrix_streamprocess_data_msg author 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '75780'], diff --git a/modules/exploits/windows/misc/doubletake.rb b/modules/exploits/windows/misc/doubletake.rb index ef87c7d57a..8c744d6cdf 100644 --- a/modules/exploits/windows/misc/doubletake.rb +++ b/modules/exploits/windows/misc/doubletake.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote was found by Titon of Bastard Labs. }, 'Author' => [ 'ri0t ' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-1661' ], diff --git a/modules/exploits/windows/misc/eiqnetworks_esa.rb b/modules/exploits/windows/misc/eiqnetworks_esa.rb index 559464d1a4..7ab715e92c 100644 --- a/modules/exploits/windows/misc/eiqnetworks_esa.rb +++ b/modules/exploits/windows/misc/eiqnetworks_esa.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote against ESA v2.1.13. }, 'Author' => [ 'MC', 'ri0t ', 'kf' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3838'], diff --git a/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb b/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb index b01c4233cd..896d50b117 100644 --- a/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb +++ b/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote This module has only been tested against ESA v2.1.13. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3838'], diff --git a/modules/exploits/windows/misc/eureka_mail_err.rb b/modules/exploits/windows/misc/eureka_mail_err.rb index 8b6f096ae6..1fcedfa586 100644 --- a/modules/exploits/windows/misc/eureka_mail_err.rb +++ b/modules/exploits/windows/misc/eureka_mail_err.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3837' ], diff --git a/modules/exploits/windows/misc/fb_isc_attach_database.rb b/modules/exploits/windows/misc/fb_isc_attach_database.rb index e3a9bd4b27..c11876ac05 100644 --- a/modules/exploits/windows/misc/fb_isc_attach_database.rb +++ b/modules/exploits/windows/misc/fb_isc_attach_database.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted create request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/windows/misc/fb_isc_create_database.rb b/modules/exploits/windows/misc/fb_isc_create_database.rb index 3a3586911e..1755ed705f 100644 --- a/modules/exploits/windows/misc/fb_isc_create_database.rb +++ b/modules/exploits/windows/misc/fb_isc_create_database.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted create request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/windows/misc/fb_svc_attach.rb b/modules/exploits/windows/misc/fb_svc_attach.rb index 91e9118227..3ed329866b 100644 --- a/modules/exploits/windows/misc/fb_svc_attach.rb +++ b/modules/exploits/windows/misc/fb_svc_attach.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted service attach request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/windows/misc/gimp_script_fu.rb b/modules/exploits/windows/misc/gimp_script_fu.rb index 8e96415b39..0370b1cc10 100644 --- a/modules/exploits/windows/misc/gimp_script_fu.rb +++ b/modules/exploits/windows/misc/gimp_script_fu.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Joseph Sheridan', # Vulnerability Discovery and PoC 'juan vazquez' # Metasploit module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-2763' ], diff --git a/modules/exploits/windows/misc/hp_dataprotector_new_folder.rb b/modules/exploits/windows/misc/hp_dataprotector_new_folder.rb index 6d97fb05b5..c5072f4d98 100644 --- a/modules/exploits/windows/misc/hp_dataprotector_new_folder.rb +++ b/modules/exploits/windows/misc/hp_dataprotector_new_folder.rb @@ -37,7 +37,6 @@ class Metasploit3 < Msf::Exploit::Remote 'juan vazquez', 'sinn3r' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2012-0124' ], diff --git a/modules/exploits/windows/misc/hp_omniinet_1.rb b/modules/exploits/windows/misc/hp_omniinet_1.rb index de20e185de..a2899447d4 100644 --- a/modules/exploits/windows/misc/hp_omniinet_1.rb +++ b/modules/exploits/windows/misc/hp_omniinet_1.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Fairuzan Roslan ', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-2280' ], diff --git a/modules/exploits/windows/misc/hp_omniinet_2.rb b/modules/exploits/windows/misc/hp_omniinet_2.rb index 5d6417ab9e..42e9a95bc5 100644 --- a/modules/exploits/windows/misc/hp_omniinet_2.rb +++ b/modules/exploits/windows/misc/hp_omniinet_2.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Fairuzan Roslan ', 'jduck' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3844' ], diff --git a/modules/exploits/windows/misc/hp_omniinet_3.rb b/modules/exploits/windows/misc/hp_omniinet_3.rb index 70301daf6b..349b7dd496 100644 --- a/modules/exploits/windows/misc/hp_omniinet_3.rb +++ b/modules/exploits/windows/misc/hp_omniinet_3.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1865' ], diff --git a/modules/exploits/windows/misc/hp_omniinet_4.rb b/modules/exploits/windows/misc/hp_omniinet_4.rb index d45c2b4120..332ab4dc1a 100644 --- a/modules/exploits/windows/misc/hp_omniinet_4.rb +++ b/modules/exploits/windows/misc/hp_omniinet_4.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote enabled by default. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Oren Isacson', #Initial discovery, poc diff --git a/modules/exploits/windows/misc/hp_ovtrace.rb b/modules/exploits/windows/misc/hp_ovtrace.rb index 1d64756e7c..043e3b8ffd 100644 --- a/modules/exploits/windows/misc/hp_ovtrace.rb +++ b/modules/exploits/windows/misc/hp_ovtrace.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote By sending a specially crafted packet, a remote attacker may be able to execute arbitrary code. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3872' ], diff --git a/modules/exploits/windows/misc/ib_isc_attach_database.rb b/modules/exploits/windows/misc/ib_isc_attach_database.rb index ecc4e697f8..b4adce5c83 100644 --- a/modules/exploits/windows/misc/ib_isc_attach_database.rb +++ b/modules/exploits/windows/misc/ib_isc_attach_database.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted attach request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/windows/misc/ib_isc_create_database.rb b/modules/exploits/windows/misc/ib_isc_create_database.rb index 4542ffdf6a..9933574609 100644 --- a/modules/exploits/windows/misc/ib_isc_create_database.rb +++ b/modules/exploits/windows/misc/ib_isc_create_database.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted create request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/windows/misc/ib_svc_attach.rb b/modules/exploits/windows/misc/ib_svc_attach.rb index 09cb484fbe..fc57873c33 100644 --- a/modules/exploits/windows/misc/ib_svc_attach.rb +++ b/modules/exploits/windows/misc/ib_svc_attach.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in Borland InterBase by sending a specially crafted service attach request. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb b/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb index 67c2caed14..0a5e5e2626 100644 --- a/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb +++ b/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3853' ], diff --git a/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb b/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb index 385a94d3de..2f7be2250f 100644 --- a/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb +++ b/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4828' ], diff --git a/modules/exploits/windows/misc/landesk_aolnsrvr.rb b/modules/exploits/windows/misc/landesk_aolnsrvr.rb index 467a6b9931..6d8dc17154 100644 --- a/modules/exploits/windows/misc/landesk_aolnsrvr.rb +++ b/modules/exploits/windows/misc/landesk_aolnsrvr.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote code can be executed. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-1674'], diff --git a/modules/exploits/windows/misc/mercury_phonebook.rb b/modules/exploits/windows/misc/mercury_phonebook.rb index 2ec86746dd..f3ec16d281 100644 --- a/modules/exploits/windows/misc/mercury_phonebook.rb +++ b/modules/exploits/windows/misc/mercury_phonebook.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-4411' ], diff --git a/modules/exploits/windows/misc/mini_stream.rb b/modules/exploits/windows/misc/mini_stream.rb index d01f0a23b5..1181d12b26 100644 --- a/modules/exploits/windows/misc/mini_stream.rb +++ b/modules/exploits/windows/misc/mini_stream.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'CORELAN Security Team ', 'Ron Henry ', # dijital1; Return address update ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-5109'], diff --git a/modules/exploits/windows/misc/mirc_privmsg_server.rb b/modules/exploits/windows/misc/mirc_privmsg_server.rb index bc98fe2d09..99981e0239 100644 --- a/modules/exploits/windows/misc/mirc_privmsg_server.rb +++ b/modules/exploits/windows/misc/mirc_privmsg_server.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4449' ], diff --git a/modules/exploits/windows/misc/ms07_064_sami.rb b/modules/exploits/windows/misc/ms07_064_sami.rb index 7ef0252fa7..b50d648c70 100644 --- a/modules/exploits/windows/misc/ms07_064_sami.rb +++ b/modules/exploits/windows/misc/ms07_064_sami.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3901' ], diff --git a/modules/exploits/windows/misc/netcat110_nt.rb b/modules/exploits/windows/misc/netcat110_nt.rb index c88878b756..969de21f96 100644 --- a/modules/exploits/windows/misc/netcat110_nt.rb +++ b/modules/exploits/windows/misc/netcat110_nt.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => 'patrick', 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1317' ], diff --git a/modules/exploits/windows/misc/nettransport.rb b/modules/exploits/windows/misc/nettransport.rb index a3a4f8635b..a94600ec60 100644 --- a/modules/exploits/windows/misc/nettransport.rb +++ b/modules/exploits/windows/misc/nettransport.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'dookie', ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '61435' ], diff --git a/modules/exploits/windows/misc/poppeeper_date.rb b/modules/exploits/windows/misc/poppeeper_date.rb index b5d82230d5..8525017434 100644 --- a/modules/exploits/windows/misc/poppeeper_date.rb +++ b/modules/exploits/windows/misc/poppeeper_date.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1029' ], diff --git a/modules/exploits/windows/misc/poppeeper_uidl.rb b/modules/exploits/windows/misc/poppeeper_uidl.rb index d08ecae39e..8e30a41c3e 100644 --- a/modules/exploits/windows/misc/poppeeper_uidl.rb +++ b/modules/exploits/windows/misc/poppeeper_uidl.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '53559' ], diff --git a/modules/exploits/windows/misc/pxexploit.rb b/modules/exploits/windows/misc/pxexploit.rb index 1797f39d12..63b845050b 100644 --- a/modules/exploits/windows/misc/pxexploit.rb +++ b/modules/exploits/windows/misc/pxexploit.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Exploit::Remote def initialize super( 'Name' => 'PXE Exploit Server', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a PXE server, running a DHCP and TFTP server. The default configuration loads a linux kernel and initrd into memory that @@ -30,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'scriptjunkie' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'DefaultOptions' => { 'EXITFUNC' => 'thread', diff --git a/modules/exploits/windows/misc/realtek_playlist.rb b/modules/exploits/windows/misc/realtek_playlist.rb index e00a85817c..a22730eb31 100644 --- a/modules/exploits/windows/misc/realtek_playlist.rb +++ b/modules/exploits/windows/misc/realtek_playlist.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5664'], diff --git a/modules/exploits/windows/misc/sap_2005_license.rb b/modules/exploits/windows/misc/sap_2005_license.rb index 6d02ab4e2f..af0b4e2bb8 100644 --- a/modules/exploits/windows/misc/sap_2005_license.rb +++ b/modules/exploits/windows/misc/sap_2005_license.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote code execution. }, 'Author' => 'Jacopo Cervini', - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '56837' ], diff --git a/modules/exploits/windows/misc/shixxnote_font.rb b/modules/exploits/windows/misc/shixxnote_font.rb index 25f99d2d8d..cebc5f75a3 100644 --- a/modules/exploits/windows/misc/shixxnote_font.rb +++ b/modules/exploits/windows/misc/shixxnote_font.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2004-1595'], diff --git a/modules/exploits/windows/misc/splayer_content_type.rb b/modules/exploits/windows/misc/splayer_content_type.rb index 58eb9ce20f..264cdf1f71 100644 --- a/modules/exploits/windows/misc/splayer_content_type.rb +++ b/modules/exploits/windows/misc/splayer_content_type.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote as the 'Content-Type' parameter. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'xsploitedsec ', #Initial discovery, PoC diff --git a/modules/exploits/windows/misc/talkative_response.rb b/modules/exploits/windows/misc/talkative_response.rb index 325c86dfe3..9b1ac830c7 100644 --- a/modules/exploits/windows/misc/talkative_response.rb +++ b/modules/exploits/windows/misc/talkative_response.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64582'], diff --git a/modules/exploits/windows/misc/tiny_identd_overflow.rb b/modules/exploits/windows/misc/tiny_identd_overflow.rb index 4e71100367..ef89972404 100644 --- a/modules/exploits/windows/misc/tiny_identd_overflow.rb +++ b/modules/exploits/windows/misc/tiny_identd_overflow.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote address and execute arbitrary code. Credit to Maarten Boone. }, 'Author' => 'Jacopo Cervini ', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2711'], diff --git a/modules/exploits/windows/misc/ufo_ai.rb b/modules/exploits/windows/misc/ufo_ai.rb index 130a2616c9..252c0b373a 100644 --- a/modules/exploits/windows/misc/ufo_ai.rb +++ b/modules/exploits/windows/misc/ufo_ai.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'dookie' # MSF Module Author ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '65689'], diff --git a/modules/exploits/windows/misc/windows_rsh.rb b/modules/exploits/windows/misc/windows_rsh.rb index 0ebd92c7ac..66919f0478 100644 --- a/modules/exploits/windows/misc/windows_rsh.rb +++ b/modules/exploits/windows/misc/windows_rsh.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-4006'], diff --git a/modules/exploits/windows/misc/wireshark_packet_dect.rb b/modules/exploits/windows/misc/wireshark_packet_dect.rb index c86e1665ec..20ddc25c95 100644 --- a/modules/exploits/windows/misc/wireshark_packet_dect.rb +++ b/modules/exploits/windows/misc/wireshark_packet_dect.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'sickness', #proof of concept 'corelanc0d3r ', #rop exploit + msf module ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1591'], diff --git a/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb b/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb index da1b1e8def..4b97aa83c5 100644 --- a/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb +++ b/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'jduck', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0478' ], diff --git a/modules/exploits/windows/motorola/timbuktu_fileupload.rb b/modules/exploits/windows/motorola/timbuktu_fileupload.rb index fe9ee50921..8ac0cf73f4 100644 --- a/modules/exploits/windows/motorola/timbuktu_fileupload.rb +++ b/modules/exploits/windows/motorola/timbuktu_fileupload.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1117' ], diff --git a/modules/exploits/windows/mssql/lyris_listmanager_weak_pass.rb b/modules/exploits/windows/mssql/lyris_listmanager_weak_pass.rb index 80fac095fc..7942402880 100644 --- a/modules/exploits/windows/mssql/lyris_listmanager_weak_pass.rb +++ b/modules/exploits/windows/mssql/lyris_listmanager_weak_pass.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-4145'], diff --git a/modules/exploits/windows/mssql/ms02_039_slammer.rb b/modules/exploits/windows/mssql/ms02_039_slammer.rb index 19e2f5c7b1..ea52d660b0 100644 --- a/modules/exploits/windows/mssql/ms02_039_slammer.rb +++ b/modules/exploits/windows/mssql/ms02_039_slammer.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-0649'], diff --git a/modules/exploits/windows/mssql/ms02_056_hello.rb b/modules/exploits/windows/mssql/ms02_056_hello.rb index 4c2f0253cc..a82bf46bb1 100644 --- a/modules/exploits/windows/mssql/ms02_056_hello.rb +++ b/modules/exploits/windows/mssql/ms02_056_hello.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-1123'], diff --git a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb index baa3f28207..4e140ecf6f 100644 --- a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb +++ b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb @@ -54,7 +54,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '50589' ], diff --git a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb index 223b1c73b8..9b8533acd6 100644 --- a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb +++ b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb @@ -54,7 +54,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Rodrigo Marcos' # SQL Injection mods ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '50589' ], diff --git a/modules/exploits/windows/mssql/mssql_payload.rb b/modules/exploits/windows/mssql/mssql_payload.rb index e34019b4c7..5d01bde070 100644 --- a/modules/exploits/windows/mssql/mssql_payload.rb +++ b/modules/exploits/windows/mssql/mssql_payload.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' # command stager mods ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # 'sa' password in logs diff --git a/modules/exploits/windows/mssql/mssql_payload_sqli.rb b/modules/exploits/windows/mssql/mssql_payload_sqli.rb index aab3dc9205..091ac967c8 100644 --- a/modules/exploits/windows/mssql/mssql_payload_sqli.rb +++ b/modules/exploits/windows/mssql/mssql_payload_sqli.rb @@ -60,7 +60,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Rodrigo Marcos' # SQL injection mods ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # 'sa' password in logs diff --git a/modules/exploits/windows/mysql/mysql_payload.rb b/modules/exploits/windows/mysql/mysql_payload.rb index f18133f638..e21769fed9 100644 --- a/modules/exploits/windows/mysql/mysql_payload.rb +++ b/modules/exploits/windows/mysql/mysql_payload.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote 'todb' # this Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # Bernardo's work with cmd exec via udf diff --git a/modules/exploits/windows/mysql/mysql_yassl_hello.rb b/modules/exploits/windows/mysql/mysql_yassl_hello.rb index ce626ef0f8..61503ae694 100644 --- a/modules/exploits/windows/mysql/mysql_yassl_hello.rb +++ b/modules/exploits/windows/mysql/mysql_yassl_hello.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0226' ], diff --git a/modules/exploits/windows/nfs/xlink_nfsd.rb b/modules/exploits/windows/nfs/xlink_nfsd.rb index b381daa5c4..e82a00372a 100644 --- a/modules/exploits/windows/nfs/xlink_nfsd.rb +++ b/modules/exploits/windows/nfs/xlink_nfsd.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote to execute arbitrary code. }, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-5780' ], diff --git a/modules/exploits/windows/nntp/ms05_030_nntp.rb b/modules/exploits/windows/nntp/ms05_030_nntp.rb index 929970a0ee..9029e420eb 100644 --- a/modules/exploits/windows/nntp/ms05_030_nntp.rb +++ b/modules/exploits/windows/nntp/ms05_030_nntp.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-1213' ], diff --git a/modules/exploits/windows/novell/groupwisemessenger_client.rb b/modules/exploits/windows/novell/groupwisemessenger_client.rb index 0dea84bbaa..ecfaf7df9a 100644 --- a/modules/exploits/windows/novell/groupwisemessenger_client.rb +++ b/modules/exploits/windows/novell/groupwisemessenger_client.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2703' ], diff --git a/modules/exploits/windows/novell/nmap_stor.rb b/modules/exploits/windows/novell/nmap_stor.rb index 03d4fe401c..517a656f2d 100644 --- a/modules/exploits/windows/novell/nmap_stor.rb +++ b/modules/exploits/windows/novell/nmap_stor.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-6424' ], diff --git a/modules/exploits/windows/novell/zenworks_desktop_agent.rb b/modules/exploits/windows/novell/zenworks_desktop_agent.rb index 8550cf6dd5..d0ab3f9384 100644 --- a/modules/exploits/windows/novell/zenworks_desktop_agent.rb +++ b/modules/exploits/windows/novell/zenworks_desktop_agent.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Unknown' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-1543'], diff --git a/modules/exploits/windows/oracle/osb_ndmp_auth.rb b/modules/exploits/windows/oracle/osb_ndmp_auth.rb index 7760d28e2a..09350c3b7a 100644 --- a/modules/exploits/windows/oracle/osb_ndmp_auth.rb +++ b/modules/exploits/windows/oracle/osb_ndmp_auth.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5444' ], diff --git a/modules/exploits/windows/oracle/tns_arguments.rb b/modules/exploits/windows/oracle/tns_arguments.rb index 465fd91570..e569457ef6 100644 --- a/modules/exploits/windows/oracle/tns_arguments.rb +++ b/modules/exploits/windows/oracle/tns_arguments.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0499' ], diff --git a/modules/exploits/windows/oracle/tns_auth_sesskey.rb b/modules/exploits/windows/oracle/tns_auth_sesskey.rb index b3688d22df..eb3009f95c 100644 --- a/modules/exploits/windows/oracle/tns_auth_sesskey.rb +++ b/modules/exploits/windows/oracle/tns_auth_sesskey.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1979'], diff --git a/modules/exploits/windows/oracle/tns_service_name.rb b/modules/exploits/windows/oracle/tns_service_name.rb index a660bd0019..a8ec9538a0 100644 --- a/modules/exploits/windows/oracle/tns_service_name.rb +++ b/modules/exploits/windows/oracle/tns_service_name.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-0965'], diff --git a/modules/exploits/windows/pop3/seattlelab_pass.rb b/modules/exploits/windows/pop3/seattlelab_pass.rb index 28d8c046ff..53f39f6a5b 100644 --- a/modules/exploits/windows/pop3/seattlelab_pass.rb +++ b/modules/exploits/windows/pop3/seattlelab_pass.rb @@ -46,7 +46,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'stinko', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2003-0264'], diff --git a/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb b/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb index cc2e5df06d..6d5e70e3ed 100644 --- a/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb +++ b/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-4085'], diff --git a/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb b/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb index bc7f857203..99ac9dc924 100644 --- a/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb +++ b/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-2416' ], diff --git a/modules/exploits/windows/proxy/proxypro_http_get.rb b/modules/exploits/windows/proxy/proxypro_http_get.rb index 43883e288b..e27e69526b 100644 --- a/modules/exploits/windows/proxy/proxypro_http_get.rb +++ b/modules/exploits/windows/proxy/proxypro_http_get.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2004-0326'], diff --git a/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb b/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb index 82bce6bb03..70f75e3eb2 100644 --- a/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb +++ b/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'patrick', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2926' ], diff --git a/modules/exploits/windows/scada/citect_scada_odbc.rb b/modules/exploits/windows/scada/citect_scada_odbc.rb index 9050a367c7..296010e3b3 100644 --- a/modules/exploits/windows/scada/citect_scada_odbc.rb +++ b/modules/exploits/windows/scada/citect_scada_odbc.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'KF ', # Original Metasploit module 'patrick', # Some clean up - I'm sure there's more to be done :) ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2639' ], diff --git a/modules/exploits/windows/scada/daq_factory_bof.rb b/modules/exploits/windows/scada/daq_factory_bof.rb index ee49a59726..d6d21a74ef 100644 --- a/modules/exploits/windows/scada/daq_factory_bof.rb +++ b/modules/exploits/windows/scada/daq_factory_bof.rb @@ -28,8 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Luigi Auriemma', # Initial discovery, crash poc 'mr_me ', # msf exploit ], - - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-3492'], diff --git a/modules/exploits/windows/scada/factorylink_csservice.rb b/modules/exploits/windows/scada/factorylink_csservice.rb index c059a5a08d..7bf741a934 100644 --- a/modules/exploits/windows/scada/factorylink_csservice.rb +++ b/modules/exploits/windows/scada/factorylink_csservice.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote therefore causing a stack-based buffer overflow, and results arbitrary code execution. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Luigi Auriemma ', #Initial discovery, poc diff --git a/modules/exploits/windows/scada/factorylink_vrn_09.rb b/modules/exploits/windows/scada/factorylink_vrn_09.rb index 92d635d2f9..f7624e0b6a 100644 --- a/modules/exploits/windows/scada/factorylink_vrn_09.rb +++ b/modules/exploits/windows/scada/factorylink_vrn_09.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'MC', # SEH, badchars, etc ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '72815'], diff --git a/modules/exploits/windows/scada/iconics_genbroker.rb b/modules/exploits/windows/scada/iconics_genbroker.rb index ea951b57e8..b97f100a76 100644 --- a/modules/exploits/windows/scada/iconics_genbroker.rb +++ b/modules/exploits/windows/scada/iconics_genbroker.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote process, and then open up a shell session. Also, DEP bypass is supported. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Luigi Auriemma', #Initial discovery, poc diff --git a/modules/exploits/windows/scada/iconics_webhmi_setactivexguid.rb b/modules/exploits/windows/scada/iconics_webhmi_setactivexguid.rb index a42fffb49a..e2996a3de7 100644 --- a/modules/exploits/windows/scada/iconics_webhmi_setactivexguid.rb +++ b/modules/exploits/windows/scada/iconics_webhmi_setactivexguid.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote of the user. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Scoot Bell ', diff --git a/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb b/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb index 8837901b0b..a47d7d4f1a 100644 --- a/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb +++ b/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote exits, IGSSdataServer.exe should automatically recover. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Author' => [ 'Luigi Auriemma', #Initial discovery, poc diff --git a/modules/exploits/windows/scada/igss9_igssdataserver_rename.rb b/modules/exploits/windows/scada/igss9_igssdataserver_rename.rb index 93506879a6..8bb201b543 100644 --- a/modules/exploits/windows/scada/igss9_igssdataserver_rename.rb +++ b/modules/exploits/windows/scada/igss9_igssdataserver_rename.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote the small buffer size, which cannot even contain our ROP chain and the final payload. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Luigi Auriemma ', #Initial discovery, poc diff --git a/modules/exploits/windows/scada/igss9_misc.rb b/modules/exploits/windows/scada/igss9_misc.rb index e921f8e713..c8644cbdf4 100644 --- a/modules/exploits/windows/scada/igss9_misc.rb +++ b/modules/exploits/windows/scada/igss9_misc.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote that payload with a CreateProcessA() function as a new thread. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Luigi Auriemma', #Initial discovery, poc diff --git a/modules/exploits/windows/scada/moxa_mdmtool.rb b/modules/exploits/windows/scada/moxa_mdmtool.rb index caffad8826..fcac4c33f6 100644 --- a/modules/exploits/windows/scada/moxa_mdmtool.rb +++ b/modules/exploits/windows/scada/moxa_mdmtool.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Ruben Santamarta', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-4741'], diff --git a/modules/exploits/windows/scada/procyon_core_server.rb b/modules/exploits/windows/scada/procyon_core_server.rb index 606b9d2366..edc6f9e86a 100644 --- a/modules/exploits/windows/scada/procyon_core_server.rb +++ b/modules/exploits/windows/scada/procyon_core_server.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote payload exits, Coreservice.exe should automatically recover. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Author' => [ 'Knud Hojgaard ', # Initial discovery diff --git a/modules/exploits/windows/scada/realwin.rb b/modules/exploits/windows/scada/realwin.rb index 852e80d824..5786756cdc 100644 --- a/modules/exploits/windows/scada/realwin.rb +++ b/modules/exploits/windows/scada/realwin.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4322' ], diff --git a/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb b/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb index 66c1848158..57dd677404 100644 --- a/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb +++ b/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Luigi Auriemma', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1563'], diff --git a/modules/exploits/windows/scada/realwin_on_fcs_login.rb b/modules/exploits/windows/scada/realwin_on_fcs_login.rb index feb1fa8a4f..f56139efe0 100644 --- a/modules/exploits/windows/scada/realwin_on_fcs_login.rb +++ b/modules/exploits/windows/scada/realwin_on_fcs_login.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'B|H ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1563'], diff --git a/modules/exploits/windows/scada/realwin_scpc_initialize.rb b/modules/exploits/windows/scada/realwin_scpc_initialize.rb index d9268f72f2..8ed3420515 100644 --- a/modules/exploits/windows/scada/realwin_scpc_initialize.rb +++ b/modules/exploits/windows/scada/realwin_scpc_initialize.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Luigi Auriemma', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '68812' ], diff --git a/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb b/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb index d1f6228a7a..bd3b4082ef 100644 --- a/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb +++ b/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Luigi Auriemma', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '68812' ], diff --git a/modules/exploits/windows/scada/realwin_scpc_txtevent.rb b/modules/exploits/windows/scada/realwin_scpc_txtevent.rb index 9ab3f85a3d..0311afefcf 100644 --- a/modules/exploits/windows/scada/realwin_scpc_txtevent.rb +++ b/modules/exploits/windows/scada/realwin_scpc_txtevent.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Luigi Auriemma', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-4142'], diff --git a/modules/exploits/windows/scada/scadapro_cmdexe.rb b/modules/exploits/windows/scada/scadapro_cmdexe.rb index 06027407e5..291d9e2fb2 100644 --- a/modules/exploits/windows/scada/scadapro_cmdexe.rb +++ b/modules/exploits/windows/scada/scadapro_cmdexe.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'mr_me ', # msf 'TecR0c ', # msf ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-3497'], diff --git a/modules/exploits/windows/scada/winlog_runtime.rb b/modules/exploits/windows/scada/winlog_runtime.rb index a7e87ff683..592a53ff6f 100644 --- a/modules/exploits/windows/scada/winlog_runtime.rb +++ b/modules/exploits/windows/scada/winlog_runtime.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Luigi Auriemma', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-0517' ], diff --git a/modules/exploits/windows/sip/aim_triton_cseq.rb b/modules/exploits/windows/sip/aim_triton_cseq.rb index 8d4c7e4b3d..c403bf5023 100644 --- a/modules/exploits/windows/sip/aim_triton_cseq.rb +++ b/modules/exploits/windows/sip/aim_triton_cseq.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote the affected application. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3524'], diff --git a/modules/exploits/windows/sip/sipxezphone_cseq.rb b/modules/exploits/windows/sip/sipxezphone_cseq.rb index 1641d8f701..db6a6093a3 100644 --- a/modules/exploits/windows/sip/sipxezphone_cseq.rb +++ b/modules/exploits/windows/sip/sipxezphone_cseq.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote the affected application. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-3524'], diff --git a/modules/exploits/windows/sip/sipxphone_cseq.rb b/modules/exploits/windows/sip/sipxphone_cseq.rb index 2e11c728b0..5823b21176 100644 --- a/modules/exploits/windows/sip/sipxphone_cseq.rb +++ b/modules/exploits/windows/sip/sipxphone_cseq.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote the affected application. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-3524' ], diff --git a/modules/exploits/windows/smb/ms03_049_netapi.rb b/modules/exploits/windows/smb/ms03_049_netapi.rb index e856dbb89f..d9add5404a 100644 --- a/modules/exploits/windows/smb/ms03_049_netapi.rb +++ b/modules/exploits/windows/smb/ms03_049_netapi.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0812' ], diff --git a/modules/exploits/windows/smb/ms04_007_killbill.rb b/modules/exploits/windows/smb/ms04_007_killbill.rb index d88c1c8096..30ff256c27 100644 --- a/modules/exploits/windows/smb/ms04_007_killbill.rb +++ b/modules/exploits/windows/smb/ms04_007_killbill.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'Solar Eclipse ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0818'], diff --git a/modules/exploits/windows/smb/ms04_011_lsass.rb b/modules/exploits/windows/smb/ms04_011_lsass.rb index cae29bc75c..0fbb4d138b 100644 --- a/modules/exploits/windows/smb/ms04_011_lsass.rb +++ b/modules/exploits/windows/smb/ms04_011_lsass.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0533' ], diff --git a/modules/exploits/windows/smb/ms04_031_netdde.rb b/modules/exploits/windows/smb/ms04_031_netdde.rb index b7d03ed480..a9220cc071 100644 --- a/modules/exploits/windows/smb/ms04_031_netdde.rb +++ b/modules/exploits/windows/smb/ms04_031_netdde.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'pusscat' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0206'], diff --git a/modules/exploits/windows/smb/ms05_039_pnp.rb b/modules/exploits/windows/smb/ms05_039_pnp.rb index 4c44d7a318..2e90692c37 100644 --- a/modules/exploits/windows/smb/ms05_039_pnp.rb +++ b/modules/exploits/windows/smb/ms05_039_pnp.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm', 'cazz' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-1983' ], diff --git a/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb b/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb index bafce063a7..ec87770a10 100644 --- a/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb +++ b/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'pusscat', 'hdm' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2370' ], diff --git a/modules/exploits/windows/smb/ms06_025_rras.rb b/modules/exploits/windows/smb/ms06_025_rras.rb index 70540890bf..35b1001752 100644 --- a/modules/exploits/windows/smb/ms06_025_rras.rb +++ b/modules/exploits/windows/smb/ms06_025_rras.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2370' ], diff --git a/modules/exploits/windows/smb/ms06_040_netapi.rb b/modules/exploits/windows/smb/ms06_040_netapi.rb index 8777b1e68c..9bc8c11b9f 100644 --- a/modules/exploits/windows/smb/ms06_040_netapi.rb +++ b/modules/exploits/windows/smb/ms06_040_netapi.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-3439' ], diff --git a/modules/exploits/windows/smb/ms06_066_nwapi.rb b/modules/exploits/windows/smb/ms06_066_nwapi.rb index 951b9d18a1..48e1bf5096 100644 --- a/modules/exploits/windows/smb/ms06_066_nwapi.rb +++ b/modules/exploits/windows/smb/ms06_066_nwapi.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'pusscat' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-4688'], diff --git a/modules/exploits/windows/smb/ms06_066_nwwks.rb b/modules/exploits/windows/smb/ms06_066_nwwks.rb index ebbdd5bfac..77e96bc970 100644 --- a/modules/exploits/windows/smb/ms06_066_nwwks.rb +++ b/modules/exploits/windows/smb/ms06_066_nwwks.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'pusscat' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-4688'], diff --git a/modules/exploits/windows/smb/ms06_070_wkssvc.rb b/modules/exploits/windows/smb/ms06_070_wkssvc.rb index 9f0a65be70..ab73292cf8 100644 --- a/modules/exploits/windows/smb/ms06_070_wkssvc.rb +++ b/modules/exploits/windows/smb/ms06_070_wkssvc.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-4691' ], diff --git a/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb b/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb index 1ff0e5f9bd..7e58942e6f 100644 --- a/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb +++ b/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Unknown' # 2 unknown contributors (2003 support) ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-1748'], diff --git a/modules/exploits/windows/smb/ms08_067_netapi.rb b/modules/exploits/windows/smb/ms08_067_netapi.rb index 924aced2e8..3723b72fc8 100644 --- a/modules/exploits/windows/smb/ms08_067_netapi.rb +++ b/modules/exploits/windows/smb/ms08_067_netapi.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Exploit::Remote 'jduck', # XP SP2/SP3 AlwaysOn DEP bypass ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4250'], diff --git a/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb b/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb index c195e62b9b..ed065abe6e 100644 --- a/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb +++ b/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'Laurent Gaffie ', 'hdm', 'sf' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'MSB', 'MS09-050' ], diff --git a/modules/exploits/windows/smb/ms10_061_spoolss.rb b/modules/exploits/windows/smb/ms10_061_spoolss.rb index 899f3dcb82..42206d722a 100644 --- a/modules/exploits/windows/smb/ms10_061_spoolss.rb +++ b/modules/exploits/windows/smb/ms10_061_spoolss.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' # ATSVC RPC proxy method, etc ;) ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => 'win', 'References' => [ diff --git a/modules/exploits/windows/smb/netidentity_xtierrpcpipe.rb b/modules/exploits/windows/smb/netidentity_xtierrpcpipe.rb index 2d89211b40..04c38e8b6d 100644 --- a/modules/exploits/windows/smb/netidentity_xtierrpcpipe.rb +++ b/modules/exploits/windows/smb/netidentity_xtierrpcpipe.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'MC', 'Ruben Santamarta' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1350' ], diff --git a/modules/exploits/windows/smb/psexec.rb b/modules/exploits/windows/smb/psexec.rb index 03fc5e4931..14b3454d45 100644 --- a/modules/exploits/windows/smb/psexec.rb +++ b/modules/exploits/windows/smb/psexec.rb @@ -46,7 +46,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm', ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Privileged' => true, 'DefaultOptions' => { diff --git a/modules/exploits/windows/smb/smb_relay.rb b/modules/exploits/windows/smb/smb_relay.rb index 982968ef76..0bc45cb8a4 100644 --- a/modules/exploits/windows/smb/smb_relay.rb +++ b/modules/exploits/windows/smb/smb_relay.rb @@ -63,7 +63,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Privileged' => true, 'DefaultOptions' => { diff --git a/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb b/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb index a124ec9b90..30e4937996 100644 --- a/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb +++ b/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'bannedit' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1394' ], diff --git a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb index 7a2562bcaa..ee25f3e722 100644 --- a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb +++ b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1638' ], diff --git a/modules/exploits/windows/smtp/mercury_cram_md5.rb b/modules/exploits/windows/smtp/mercury_cram_md5.rb index 640fe6e801..e0379df49e 100644 --- a/modules/exploits/windows/smtp/mercury_cram_md5.rb +++ b/modules/exploits/windows/smtp/mercury_cram_md5.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote may be able to execute arbitrary code. }, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-4440' ], diff --git a/modules/exploits/windows/smtp/ms03_046_exchange2000_xexch50.rb b/modules/exploits/windows/smtp/ms03_046_exchange2000_xexch50.rb index 5eac1166bf..f3ca211cec 100644 --- a/modules/exploits/windows/smtp/ms03_046_exchange2000_xexch50.rb +++ b/modules/exploits/windows/smtp/ms03_046_exchange2000_xexch50.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Exploit::Remote 'hdm', # original module 'patrick', # msf3 port :) ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0714' ], diff --git a/modules/exploits/windows/smtp/njstar_smtp_bof.rb b/modules/exploits/windows/smtp/njstar_smtp_bof.rb index 004c90232e..1fec8e6545 100644 --- a/modules/exploits/windows/smtp/njstar_smtp_bof.rb +++ b/modules/exploits/windows/smtp/njstar_smtp_bof.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Dillon Beresford', # Original discovery and MSF Module. ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '76728' ], diff --git a/modules/exploits/windows/smtp/wmailserver.rb b/modules/exploits/windows/smtp/wmailserver.rb index 05fac2e4ec..7304dc55e7 100644 --- a/modules/exploits/windows/smtp/wmailserver.rb +++ b/modules/exploits/windows/smtp/wmailserver.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote (SMTP) via a SEH frame overwrite. }, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2287' ], diff --git a/modules/exploits/windows/smtp/ypops_overflow1.rb b/modules/exploits/windows/smtp/ypops_overflow1.rb index ca14a6e580..881879ad99 100644 --- a/modules/exploits/windows/smtp/ypops_overflow1.rb +++ b/modules/exploits/windows/smtp/ypops_overflow1.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote jmp ebx opcode in ws_32.dll }, 'Author' => [ 'acaro ' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1558'], diff --git a/modules/exploits/windows/ssh/freeftpd_key_exchange.rb b/modules/exploits/windows/ssh/freeftpd_key_exchange.rb index 1568d286ab..a42eb89173 100644 --- a/modules/exploits/windows/ssh/freeftpd_key_exchange.rb +++ b/modules/exploits/windows/ssh/freeftpd_key_exchange.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'riaf ', 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-2407'], diff --git a/modules/exploits/windows/ssh/freesshd_key_exchange.rb b/modules/exploits/windows/ssh/freesshd_key_exchange.rb index a93aadd0f4..5fa9f4c614 100644 --- a/modules/exploits/windows/ssh/freesshd_key_exchange.rb +++ b/modules/exploits/windows/ssh/freesshd_key_exchange.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-2407'], diff --git a/modules/exploits/windows/ssh/putty_msg_debug.rb b/modules/exploits/windows/ssh/putty_msg_debug.rb index a11dbe6a6a..afaf7af9d9 100644 --- a/modules/exploits/windows/ssh/putty_msg_debug.rb +++ b/modules/exploits/windows/ssh/putty_msg_debug.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-1359' ], diff --git a/modules/exploits/windows/ssh/securecrt_ssh1.rb b/modules/exploits/windows/ssh/securecrt_ssh1.rb index d7e1bed10b..6e7e125f91 100644 --- a/modules/exploits/windows/ssh/securecrt_ssh1.rb +++ b/modules/exploits/windows/ssh/securecrt_ssh1.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2002-1059' ], diff --git a/modules/exploits/windows/ssl/ms04_011_pct.rb b/modules/exploits/windows/ssl/ms04_011_pct.rb index 690d6790c0..b192ea90ba 100644 --- a/modules/exploits/windows/ssl/ms04_011_pct.rb +++ b/modules/exploits/windows/ssl/ms04_011_pct.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0719'], diff --git a/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb b/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb index 76cd430efe..8a6bf3ce31 100644 --- a/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb +++ b/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2000-0665'], diff --git a/modules/exploits/windows/telnet/goodtech_telnet.rb b/modules/exploits/windows/telnet/goodtech_telnet.rb index 684e5ce990..6f618ab8c8 100644 --- a/modules/exploits/windows/telnet/goodtech_telnet.rb +++ b/modules/exploits/windows/telnet/goodtech_telnet.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-0768' ], diff --git a/modules/exploits/windows/tftp/attftp_long_filename.rb b/modules/exploits/windows/tftp/attftp_long_filename.rb index 306b370a50..d808463791 100644 --- a/modules/exploits/windows/tftp/attftp_long_filename.rb +++ b/modules/exploits/windows/tftp/attftp_long_filename.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote request (get/write) for an overly long file name. }, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-6184'], diff --git a/modules/exploits/windows/tftp/dlink_long_filename.rb b/modules/exploits/windows/tftp/dlink_long_filename.rb index 315228ba6b..e58f025a3e 100644 --- a/modules/exploits/windows/tftp/dlink_long_filename.rb +++ b/modules/exploits/windows/tftp/dlink_long_filename.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote 'LSO ', # Exploit module 'patrick', # Refs, stability, targets etc ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-1435' ], diff --git a/modules/exploits/windows/tftp/futuresoft_transfermode.rb b/modules/exploits/windows/tftp/futuresoft_transfermode.rb index c67505ee86..ae741b0194 100644 --- a/modules/exploits/windows/tftp/futuresoft_transfermode.rb +++ b/modules/exploits/windows/tftp/futuresoft_transfermode.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Exploit::Remote Windows 2000 Server (could not trigger the overflow at all). }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-1812'], diff --git a/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb b/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb index 15f7586966..7ebf7dfd95 100644 --- a/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb +++ b/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote in a DoS. This is a port of a sploit by Mati "muts" Aharoni. }, 'Author' => 'Saint Patrick', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2008-1610'], diff --git a/modules/exploits/windows/tftp/tftpd32_long_filename.rb b/modules/exploits/windows/tftp/tftpd32_long_filename.rb index f8915d4189..cd0b823724 100644 --- a/modules/exploits/windows/tftp/tftpd32_long_filename.rb +++ b/modules/exploits/windows/tftp/tftpd32_long_filename.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote execute arbitrary code on the system. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2002-2226'], diff --git a/modules/exploits/windows/tftp/tftpdwin_long_filename.rb b/modules/exploits/windows/tftp/tftpdwin_long_filename.rb index c8eb8a0289..6acef18d24 100644 --- a/modules/exploits/windows/tftp/tftpdwin_long_filename.rb +++ b/modules/exploits/windows/tftp/tftpdwin_long_filename.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Exploit::Remote an overly long file name to the tftpd.exe server, the stack can be overwritten. }, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-4948' ], diff --git a/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb b/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb index 6b6ee6abca..f433fc0071 100644 --- a/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb +++ b/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Exploit::Remote arbitrary code on the system. }, 'Author' => 'MC', - 'Version' => '$Revision$', 'References' => [ ['CVE', '2006-6183'], diff --git a/modules/exploits/windows/unicenter/cam_log_security.rb b/modules/exploits/windows/unicenter/cam_log_security.rb index ea2581a231..a80d9bd0d8 100644 --- a/modules/exploits/windows/unicenter/cam_log_security.rb +++ b/modules/exploits/windows/unicenter/cam_log_security.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2668'], diff --git a/modules/exploits/windows/vnc/realvnc_client.rb b/modules/exploits/windows/vnc/realvnc_client.rb index 876ee4caba..679c8198c5 100644 --- a/modules/exploits/windows/vnc/realvnc_client.rb +++ b/modules/exploits/windows/vnc/realvnc_client.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2001-0167' ], diff --git a/modules/exploits/windows/vnc/ultravnc_client.rb b/modules/exploits/windows/vnc/ultravnc_client.rb index 0f2aea4290..52c2a1c485 100644 --- a/modules/exploits/windows/vnc/ultravnc_client.rb +++ b/modules/exploits/windows/vnc/ultravnc_client.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'MC', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-1652' ], diff --git a/modules/exploits/windows/vnc/ultravnc_viewer_bof.rb b/modules/exploits/windows/vnc/ultravnc_viewer_bof.rb index 65c1e3c468..42c379d080 100644 --- a/modules/exploits/windows/vnc/ultravnc_viewer_bof.rb +++ b/modules/exploits/windows/vnc/ultravnc_viewer_bof.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => 'noperand', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0610' ], diff --git a/modules/exploits/windows/vnc/winvnc_http_get.rb b/modules/exploits/windows/vnc/winvnc_http_get.rb index 208585b229..f0a0ccb507 100644 --- a/modules/exploits/windows/vnc/winvnc_http_get.rb +++ b/modules/exploits/windows/vnc/winvnc_http_get.rb @@ -24,7 +24,6 @@ require 'msf/core' }, 'Author' => 'patrick', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '2306' ], diff --git a/modules/exploits/windows/vpn/safenet_ike_11.rb b/modules/exploits/windows/vpn/safenet_ike_11.rb index 579ca014e8..a769311a18 100644 --- a/modules/exploits/windows/vpn/safenet_ike_11.rb +++ b/modules/exploits/windows/vpn/safenet_ike_11.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Exploit::Remote windows/meterpreter/reverse_ord_tcp payloads. }, 'Author' => [ 'MC' ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1943' ], diff --git a/modules/exploits/windows/wins/ms04_045_wins.rb b/modules/exploits/windows/wins/ms04_045_wins.rb index 7f8fecd435..cb8fab4688 100644 --- a/modules/exploits/windows/wins/ms04_045_wins.rb +++ b/modules/exploits/windows/wins/ms04_045_wins.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1080'], diff --git a/modules/nops/armle/simple.rb b/modules/nops/armle/simple.rb index 3d55a37a69..29dd960512 100644 --- a/modules/nops/armle/simple.rb +++ b/modules/nops/armle/simple.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Nop super( 'Name' => 'Simple', 'Alias' => 'armle_simple', - 'Version' => '$Revision$', 'Description' => 'Simple NOP generator', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/nops/php/generic.rb b/modules/nops/php/generic.rb index 602fa44946..a6d39d39c1 100644 --- a/modules/nops/php/generic.rb +++ b/modules/nops/php/generic.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Nop super( 'Name' => 'PHP Nop Generator', 'Alias' => 'php_generic', - 'Version' => '$Revision$', 'Description' => 'Generates harmless padding for PHP scripts', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/nops/ppc/simple.rb b/modules/nops/ppc/simple.rb index 64e60fe345..ae5b9edc0b 100644 --- a/modules/nops/ppc/simple.rb +++ b/modules/nops/ppc/simple.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Nop super( 'Name' => 'Simple', 'Alias' => 'ppc_simple', - 'Version' => '$Revision$', 'Description' => 'Simple NOP generator', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/nops/sparc/random.rb b/modules/nops/sparc/random.rb index 26caa3e121..1732cc8597 100644 --- a/modules/nops/sparc/random.rb +++ b/modules/nops/sparc/random.rb @@ -77,7 +77,6 @@ class Metasploit3 < Msf::Nop super( 'Name' => 'SPARC NOP Generator', 'Alias' => 'sparc_simple', - 'Version' => '$Revision$', 'Description' => 'SPARC NOP generator', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/nops/tty/generic.rb b/modules/nops/tty/generic.rb index 177669cff9..99bb3e498a 100644 --- a/modules/nops/tty/generic.rb +++ b/modules/nops/tty/generic.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Nop super( 'Name' => 'TTY Nop Generator', 'Alias' => 'tty_generic', - 'Version' => '$Revision$', 'Description' => 'Generates harmless padding for TTY input', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/nops/x64/simple.rb b/modules/nops/x64/simple.rb index 40f2dbfa83..b475feffb3 100644 --- a/modules/nops/x64/simple.rb +++ b/modules/nops/x64/simple.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Nop super( 'Name' => 'Simple', 'Alias' => 'x64_simple', - 'Version' => '$Revision$', 'Description' => 'An x64 single/multi byte NOP instruction generator.', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/nops/x86/opty2.rb b/modules/nops/x86/opty2.rb index c0ec17e6a0..7ec5abe9cf 100644 --- a/modules/nops/x86/opty2.rb +++ b/modules/nops/x86/opty2.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Nop def initialize super( 'Name' => 'Opty2', - 'Version' => '$Revision$', 'Description' => 'Opty2 multi-byte NOP generator', 'Author' => [ 'spoonm', 'optyx' ], 'License' => MSF_LICENSE, diff --git a/modules/nops/x86/single_byte.rb b/modules/nops/x86/single_byte.rb index 3dba13f0c1..e362e4f33e 100644 --- a/modules/nops/x86/single_byte.rb +++ b/modules/nops/x86/single_byte.rb @@ -84,7 +84,6 @@ SINGLE_BYTE_SLED = super( 'Name' => 'Single Byte', 'Alias' => 'ia32_singlebyte', - 'Version' => '$Revision$', 'Description' => 'Single-byte NOP generator', 'Author' => 'spoonm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb b/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb index e66c898fb1..b66f76ab28 100644 --- a/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb +++ b/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'AIX Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/aix/ppc/shell_find_port.rb b/modules/payloads/singles/aix/ppc/shell_find_port.rb index d92ed471ad..457e8c7d20 100644 --- a/modules/payloads/singles/aix/ppc/shell_find_port.rb +++ b/modules/payloads/singles/aix/ppc/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'AIX Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/aix/ppc/shell_interact.rb b/modules/payloads/singles/aix/ppc/shell_interact.rb index a13c17fd9d..39c6f55acc 100644 --- a/modules/payloads/singles/aix/ppc/shell_interact.rb +++ b/modules/payloads/singles/aix/ppc/shell_interact.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'AIX execve shell for inetd', - 'Version' => '$Revision$', 'Description' => 'Simply execve /bin/sh (for inetd programs)', 'Author' => 'jduck', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb b/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb index 8516aa14c7..bfd0c3da16 100644 --- a/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'AIX Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb b/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb index 76d5326ac6..9ec4d4f7e0 100644 --- a/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb +++ b/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb b/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb index 85bb4003b9..0b154a7178 100644 --- a/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/exec.rb b/modules/payloads/singles/bsd/x86/exec.rb index c93fb05aa0..7c75882773 100644 --- a/modules/payloads/singles/bsd/x86/exec.rb +++ b/modules/payloads/singles/bsd/x86/exec.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command', 'Author' => 'vlad902', 'License' => MSF_LICENSE, @@ -50,7 +49,6 @@ module Metasploit3 ; Name: single_exec ; Platforms: *BSD ; Author: vlad902 -; Version: $Revision$ ; License: ; ; This file is part of the Metasploit Exploit Framework diff --git a/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb b/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb index 96adfcc486..0e6a470ab3 100644 --- a/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb +++ b/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'FreeBSD Meterpreter Service, Bind TCP', - 'Version' => '$Revision$', 'Description' => 'Stub payload for interacting with a Meterpreter Service', 'Author' => 'hdm', 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb b/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb index 1b20d8a914..3e163e398a 100644 --- a/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb +++ b/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'FreeBSD Meterpreter Service, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Stub payload for interacting with a Meterpreter Service', 'Author' => 'hdm', 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb b/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb index c0a18c8f59..07a58c0f0a 100644 --- a/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb b/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb index c37c6bbde0..58541dd844 100644 --- a/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb +++ b/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Bind TCP Inline (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell over IPv6', 'Author' => ['skape', 'vlad902', 'hdm'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/shell_find_port.rb b/modules/payloads/singles/bsd/x86/shell_find_port.rb index fd787313f7..56c8f83983 100644 --- a/modules/payloads/singles/bsd/x86/shell_find_port.rb +++ b/modules/payloads/singles/bsd/x86/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/shell_find_tag.rb b/modules/payloads/singles/bsd/x86/shell_find_tag.rb index 08b849d867..1f39047450 100644 --- a/modules/payloads/singles/bsd/x86/shell_find_tag.rb +++ b/modules/payloads/singles/bsd/x86/shell_find_tag.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Find Tag Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection (proxy/nat safe)', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb b/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb index ae8bd3b9e7..81b283ce99 100644 --- a/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb b/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb index 226268102f..a17bd86663 100644 --- a/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb +++ b/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell, Reverse TCP Inline (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell over IPv6', 'Author' => [ 'skape', 'vlad902', 'hdm' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb b/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb index 54c2206d5d..c72aff9211 100644 --- a/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSDi Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => [ 'skape', 'optyx' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsdi/x86/shell_find_port.rb b/modules/payloads/singles/bsdi/x86/shell_find_port.rb index 1eee2d58d0..de0b83a149 100644 --- a/modules/payloads/singles/bsdi/x86/shell_find_port.rb +++ b/modules/payloads/singles/bsdi/x86/shell_find_port.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSDi Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => [ 'skape', 'optyx' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb b/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb index 15313de703..903fde9e49 100644 --- a/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSDi Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => [ 'skape', 'optyx' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/bind_inetd.rb b/modules/payloads/singles/cmd/unix/bind_inetd.rb index 0ab4e031b5..e8810c84b4 100644 --- a/modules/payloads/singles/cmd/unix/bind_inetd.rb +++ b/modules/payloads/singles/cmd/unix/bind_inetd.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Bind TCP (inetd)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell (persistent)', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/bind_netcat.rb b/modules/payloads/singles/cmd/unix/bind_netcat.rb index 6cdcc0e8cf..cb4d8dbc38 100644 --- a/modules/payloads/singles/cmd/unix/bind_netcat.rb +++ b/modules/payloads/singles/cmd/unix/bind_netcat.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Bind TCP (via netcat -e)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via netcat', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/bind_netcat_ipv6.rb b/modules/payloads/singles/cmd/unix/bind_netcat_ipv6.rb index 5672706519..f5c4d05675 100644 --- a/modules/payloads/singles/cmd/unix/bind_netcat_ipv6.rb +++ b/modules/payloads/singles/cmd/unix/bind_netcat_ipv6.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Bind TCP (via netcat -e) IPv6', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via netcat', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/bind_perl.rb b/modules/payloads/singles/cmd/unix/bind_perl.rb index a0f431af9f..f0361c6406 100644 --- a/modules/payloads/singles/cmd/unix/bind_perl.rb +++ b/modules/payloads/singles/cmd/unix/bind_perl.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Bind TCP (via Perl)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via perl', 'Author' => ['Samy ', 'cazz'], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb b/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb index c08b96aaed..6ec83ad666 100644 --- a/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb +++ b/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Bind TCP (via perl) IPv6', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via perl', 'Author' => ['Samy ', 'cazz'], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/bind_ruby.rb b/modules/payloads/singles/cmd/unix/bind_ruby.rb index a08f2c29d6..ba3f797be6 100644 --- a/modules/payloads/singles/cmd/unix/bind_ruby.rb +++ b/modules/payloads/singles/cmd/unix/bind_ruby.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Bind TCP (via Ruby)', - 'Version' => '$Revision$', 'Description' => 'Continually listen for a connection and spawn a command shell via Ruby', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/bind_ruby_ipv6.rb b/modules/payloads/singles/cmd/unix/bind_ruby_ipv6.rb index a6fe97b8ea..a6c85ad106 100644 --- a/modules/payloads/singles/cmd/unix/bind_ruby_ipv6.rb +++ b/modules/payloads/singles/cmd/unix/bind_ruby_ipv6.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Bind TCP (via Ruby) IPv6', - 'Version' => '$Revision$', 'Description' => 'Continually listen for a connection and spawn a command shell via Ruby', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/generic.rb b/modules/payloads/singles/cmd/unix/generic.rb index 379f4c51bc..a220a01a9f 100644 --- a/modules/payloads/singles/cmd/unix/generic.rb +++ b/modules/payloads/singles/cmd/unix/generic.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command, Generic Command Execution', - 'Version' => '$Revision$', 'Description' => 'Executes the supplied command', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/interact.rb b/modules/payloads/singles/cmd/unix/interact.rb index dd04b96158..c031b2f2cd 100644 --- a/modules/payloads/singles/cmd/unix/interact.rb +++ b/modules/payloads/singles/cmd/unix/interact.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command, Interact with Established Connection', - 'Version' => '$Revision$', 'Description' => 'Interacts with a shell on an established socket connection', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/reverse.rb b/modules/payloads/singles/cmd/unix/reverse.rb index d4e63fc555..424680677b 100644 --- a/modules/payloads/singles/cmd/unix/reverse.rb +++ b/modules/payloads/singles/cmd/unix/reverse.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Double reverse TCP (telnet)', - 'Version' => '$Revision$', 'Description' => 'Creates an interactive shell through two inbound connections', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/reverse_bash.rb b/modules/payloads/singles/cmd/unix/reverse_bash.rb index c2dc4fe1b5..c34894c110 100644 --- a/modules/payloads/singles/cmd/unix/reverse_bash.rb +++ b/modules/payloads/singles/cmd/unix/reverse_bash.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Reverse TCP (/dev/tcp)', - 'Version' => '$Revision$', 'Description' => %q{ Creates an interactive shell via bash's builtin /dev/tcp. This will not work on most Debian-based Linux distributions diff --git a/modules/payloads/singles/cmd/unix/reverse_netcat.rb b/modules/payloads/singles/cmd/unix/reverse_netcat.rb index 1a0caf787d..fd84a11d48 100644 --- a/modules/payloads/singles/cmd/unix/reverse_netcat.rb +++ b/modules/payloads/singles/cmd/unix/reverse_netcat.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Reverse TCP (via netcat -e)', - 'Version' => '$Revision$', 'Description' => 'Creates an interactive shell via netcat', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/reverse_perl.rb b/modules/payloads/singles/cmd/unix/reverse_perl.rb index 5fed27b432..4e39a0a0a6 100644 --- a/modules/payloads/singles/cmd/unix/reverse_perl.rb +++ b/modules/payloads/singles/cmd/unix/reverse_perl.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Reverse TCP (via Perl)', - 'Version' => '$Revision$', 'Description' => 'Creates an interactive shell via perl', 'Author' => 'cazz', 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/cmd/unix/reverse_ruby.rb b/modules/payloads/singles/cmd/unix/reverse_ruby.rb index 2dc9b88f12..d6f75cec7e 100644 --- a/modules/payloads/singles/cmd/unix/reverse_ruby.rb +++ b/modules/payloads/singles/cmd/unix/reverse_ruby.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix Command Shell, Reverse TCP (via Ruby)', - 'Version' => '$Revision$', 'Description' => 'Connect back and create a command shell via Ruby', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/windows/adduser.rb b/modules/payloads/singles/cmd/windows/adduser.rb index bd932f2099..2af7ce073f 100644 --- a/modules/payloads/singles/cmd/windows/adduser.rb +++ b/modules/payloads/singles/cmd/windows/adduser.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Execute net user /ADD CMD', - 'Version' => '$Revision$', 'Description' => %q{ Create a new user and add them to local administration group. diff --git a/modules/payloads/singles/cmd/windows/bind_perl.rb b/modules/payloads/singles/cmd/windows/bind_perl.rb index 8c0000aa46..8a30eda1d6 100644 --- a/modules/payloads/singles/cmd/windows/bind_perl.rb +++ b/modules/payloads/singles/cmd/windows/bind_perl.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command Shell, Bind TCP (via Perl)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via perl (persistent)', 'Author' => ['Samy ', 'cazz', 'patrick'], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb b/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb index 21014511e9..b45a80c79f 100644 --- a/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb +++ b/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command Shell, Bind TCP (via perl) IPv6', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via perl (persistent)', 'Author' => ['Samy ', 'cazz', 'patrick'], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/cmd/windows/bind_ruby.rb b/modules/payloads/singles/cmd/windows/bind_ruby.rb index 8f619eecfa..40938e1770 100644 --- a/modules/payloads/singles/cmd/windows/bind_ruby.rb +++ b/modules/payloads/singles/cmd/windows/bind_ruby.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command Shell, Bind TCP (via Ruby)', - 'Version' => '$Revision$', 'Description' => 'Continually listen for a connection and spawn a command shell via Ruby', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/cmd/windows/download_eval_vbs.rb b/modules/payloads/singles/cmd/windows/download_eval_vbs.rb index 3e0b8438a1..1fbb3e6b21 100644 --- a/modules/payloads/singles/cmd/windows/download_eval_vbs.rb +++ b/modules/payloads/singles/cmd/windows/download_eval_vbs.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Executable Download and Evaluate VBS', - 'Version' => '$Revision$', 'Description' => 'Downloads a file from an HTTP(S) URL and executes it as a vbs script. Use it to stage a vbs encoded payload from a short command line. ', 'Author' => 'scriptjunkie', diff --git a/modules/payloads/singles/cmd/windows/download_exec_vbs.rb b/modules/payloads/singles/cmd/windows/download_exec_vbs.rb index 82e610922f..57c179bfca 100644 --- a/modules/payloads/singles/cmd/windows/download_exec_vbs.rb +++ b/modules/payloads/singles/cmd/windows/download_exec_vbs.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Executable Download and Execute (via .vbs)', - 'Version' => '$Revision$', 'Description' => 'Download an EXE from an HTTP(S) URL and execute it', 'Author' => 'scriptjunkie', 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/cmd/windows/reverse_perl.rb b/modules/payloads/singles/cmd/windows/reverse_perl.rb index 7e150d657a..37bb01b97d 100644 --- a/modules/payloads/singles/cmd/windows/reverse_perl.rb +++ b/modules/payloads/singles/cmd/windows/reverse_perl.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command, Double reverse TCP connection (via Perl)', - 'Version' => '$Revision$', 'Description' => 'Creates an interactive shell via perl', 'Author' => ['cazz', 'patrick'], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/cmd/windows/reverse_ruby.rb b/modules/payloads/singles/cmd/windows/reverse_ruby.rb index 7f71cd3001..5f623a9f28 100644 --- a/modules/payloads/singles/cmd/windows/reverse_ruby.rb +++ b/modules/payloads/singles/cmd/windows/reverse_ruby.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command Shell, Reverse TCP (via Ruby)', - 'Version' => '$Revision$', 'Description' => 'Connect back and create a command shell via Ruby', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/generic/custom.rb b/modules/payloads/singles/generic/custom.rb index cd49cb226c..68c0da9d21 100644 --- a/modules/payloads/singles/generic/custom.rb +++ b/modules/payloads/singles/generic/custom.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Custom Payload', - 'Version' => '$Revision$', 'Description' => 'Use custom string or file as payload. Set either PAYLOADFILE or PAYLOADSTR.', 'Author' => 'scriptjunkie ', diff --git a/modules/payloads/singles/generic/debug_trap.rb b/modules/payloads/singles/generic/debug_trap.rb index 31777a8380..ad12644bd4 100644 --- a/modules/payloads/singles/generic/debug_trap.rb +++ b/modules/payloads/singles/generic/debug_trap.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Generic x86 Debug Trap', - 'Version' => '$Revision$', 'Description' => 'Generate a debug trap in the target process', 'Author' => 'robert ', 'Platform' => [ 'win', 'linux', 'bsd', 'solaris', 'bsdi', 'osx' ], diff --git a/modules/payloads/singles/generic/shell_bind_tcp.rb b/modules/payloads/singles/generic/shell_bind_tcp.rb index 9abb11086d..e175e8740b 100644 --- a/modules/payloads/singles/generic/shell_bind_tcp.rb +++ b/modules/payloads/singles/generic/shell_bind_tcp.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Generic Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/generic/shell_reverse_tcp.rb b/modules/payloads/singles/generic/shell_reverse_tcp.rb index ad59e07cf3..90bb47a350 100644 --- a/modules/payloads/singles/generic/shell_reverse_tcp.rb +++ b/modules/payloads/singles/generic/shell_reverse_tcp.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Generic Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/generic/tight_loop.rb b/modules/payloads/singles/generic/tight_loop.rb index 55b7ed0487..de6146b2e9 100644 --- a/modules/payloads/singles/generic/tight_loop.rb +++ b/modules/payloads/singles/generic/tight_loop.rb @@ -15,7 +15,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Generic x86 Tight Loop', - 'Version' => '$Revision$', 'Description' => 'Generate a tight loop in the target process', 'Author' => 'jduck', 'Platform' => [ 'win', 'linux', 'bsd', 'solaris', 'bsdi', 'osx' ], diff --git a/modules/payloads/singles/java/jsp_shell_bind_tcp.rb b/modules/payloads/singles/java/jsp_shell_bind_tcp.rb index 81c06e1c2f..0f38f7a307 100644 --- a/modules/payloads/singles/java/jsp_shell_bind_tcp.rb +++ b/modules/payloads/singles/java/jsp_shell_bind_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Java JSP Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb b/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb index 129d2fda3f..4ff0253704 100644 --- a/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb +++ b/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Java JSP Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/java/shell_reverse_tcp.rb b/modules/payloads/singles/java/shell_reverse_tcp.rb index 9ec5d1fb8b..c8cf54c89c 100644 --- a/modules/payloads/singles/java/shell_reverse_tcp.rb +++ b/modules/payloads/singles/java/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Java Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => [ 'mihi', # all the hard work diff --git a/modules/payloads/singles/linux/armle/adduser.rb b/modules/payloads/singles/linux/armle/adduser.rb index c70bda4ceb..8d9de67d96 100644 --- a/modules/payloads/singles/linux/armle/adduser.rb +++ b/modules/payloads/singles/linux/armle/adduser.rb @@ -24,7 +24,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Add User', - 'Version' => '$Revision$', 'Description' => 'Create a new user with UID 0', 'Author' => [ 'Jonathan Salwan' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/armle/exec.rb b/modules/payloads/singles/linux/armle/exec.rb index 0ef9335901..8eb7c19354 100644 --- a/modules/payloads/singles/linux/armle/exec.rb +++ b/modules/payloads/singles/linux/armle/exec.rb @@ -23,7 +23,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command', 'Author' => 'Jonathan Salwan', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb b/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb index d810f36d00..b696fe9717 100644 --- a/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'civ', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb b/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb index 3676f489de..e3b79898f5 100644 --- a/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb @@ -21,7 +21,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Julien Tinnes', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb index c6c0f0ea75..38bb3a6462 100644 --- a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb @@ -22,7 +22,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Julien Tinnes', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb b/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb index b4bba4e6fd..f4b4e0bb57 100644 --- a/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/ppc/shell_find_port.rb b/modules/payloads/singles/linux/ppc/shell_find_port.rb index 57cd7f86cc..1ef2d8dd01 100644 --- a/modules/payloads/singles/linux/ppc/shell_find_port.rb +++ b/modules/payloads/singles/linux/ppc/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb b/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb index 4a5822c009..681b2c81d2 100644 --- a/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb b/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb index 8a10844c49..9fcbbfcb6c 100644 --- a/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/ppc64/shell_find_port.rb b/modules/payloads/singles/linux/ppc64/shell_find_port.rb index 60886a9d6e..dc72b95e22 100644 --- a/modules/payloads/singles/linux/ppc64/shell_find_port.rb +++ b/modules/payloads/singles/linux/ppc64/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb b/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb index 7f13db99c7..cb120dd01a 100644 --- a/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x64/exec.rb b/modules/payloads/singles/linux/x64/exec.rb index 48c6718072..1f48228a4d 100644 --- a/modules/payloads/singles/linux/x64/exec.rb +++ b/modules/payloads/singles/linux/x64/exec.rb @@ -15,7 +15,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command', 'Author' => 'ricky', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x64/shell_bind_tcp.rb b/modules/payloads/singles/linux/x64/shell_bind_tcp.rb index 24b14e3bb9..2c1cb6199e 100644 --- a/modules/payloads/singles/linux/x64/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/x64/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'ricky', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x64/shell_find_port.rb b/modules/payloads/singles/linux/x64/shell_find_port.rb index 4c2f82c51f..494491b406 100644 --- a/modules/payloads/singles/linux/x64/shell_find_port.rb +++ b/modules/payloads/singles/linux/x64/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'mak', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x64/shell_reverse_tcp.rb b/modules/payloads/singles/linux/x64/shell_reverse_tcp.rb index 521139f06e..0766ee3ad6 100644 --- a/modules/payloads/singles/linux/x64/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/x64/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'ricky', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/adduser.rb b/modules/payloads/singles/linux/x86/adduser.rb index e9657cb748..4fdfe16420 100644 --- a/modules/payloads/singles/linux/x86/adduser.rb +++ b/modules/payloads/singles/linux/x86/adduser.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Add User', - 'Version' => '$Revision$', 'Description' => 'Create a new user with UID 0', 'Author' => [ 'skape', 'vlad902', 'spoonm' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/chmod.rb b/modules/payloads/singles/linux/x86/chmod.rb index d27acb8945..502424045c 100644 --- a/modules/payloads/singles/linux/x86/chmod.rb +++ b/modules/payloads/singles/linux/x86/chmod.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Chmod', - 'Version' => '$Revision$', 'Description' => 'Runs chmod on specified file with specified mode', 'Author' => 'kris katterjohn', 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/linux/x86/exec.rb b/modules/payloads/singles/linux/x86/exec.rb index 20ba8e8481..8261d1441f 100644 --- a/modules/payloads/singles/linux/x86/exec.rb +++ b/modules/payloads/singles/linux/x86/exec.rb @@ -23,7 +23,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb b/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb index 71fda53e43..ad01db5ad0 100644 --- a/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb +++ b/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Meterpreter Service, Bind TCP', - 'Version' => '$Revision$', 'Description' => 'Stub payload for interacting with a Meterpreter Service', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb b/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb index bd6a4944be..4beba0b52a 100644 --- a/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb +++ b/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Meterpreter Service, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Stub payload for interacting with a Meterpreter Service', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/shell_bind_ipv6_tcp.rb b/modules/payloads/singles/linux/x86/shell_bind_ipv6_tcp.rb index 7205514d16..ade77665e5 100644 --- a/modules/payloads/singles/linux/x86/shell_bind_ipv6_tcp.rb +++ b/modules/payloads/singles/linux/x86/shell_bind_ipv6_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Bind TCP Inline (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection over IPv6 and spawn a command shell', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/shell_bind_tcp.rb b/modules/payloads/singles/linux/x86/shell_bind_tcp.rb index 82b1dbcefd..646297f00c 100644 --- a/modules/payloads/singles/linux/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/x86/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/shell_find_port.rb b/modules/payloads/singles/linux/x86/shell_find_port.rb index f889e65d21..4cd568c671 100644 --- a/modules/payloads/singles/linux/x86/shell_find_port.rb +++ b/modules/payloads/singles/linux/x86/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/shell_find_tag.rb b/modules/payloads/singles/linux/x86/shell_find_tag.rb index df5ac66edc..f599e6308b 100644 --- a/modules/payloads/singles/linux/x86/shell_find_tag.rb +++ b/modules/payloads/singles/linux/x86/shell_find_tag.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Find Tag Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection (proxy/nat safe)', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb b/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb index b42f233e1a..f2a9231650 100644 --- a/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/linux/x86/shell_reverse_tcp2.rb b/modules/payloads/singles/linux/x86/shell_reverse_tcp2.rb index c01f0246f1..ec1159cc8c 100644 --- a/modules/payloads/singles/linux/x86/shell_reverse_tcp2.rb +++ b/modules/payloads/singles/linux/x86/shell_reverse_tcp2.rb @@ -26,7 +26,6 @@ module Metasploit3 # and: puts shellcode.decode super(merge_info(info, 'Name' => 'Linux Command Shell, Reverse TCP Inline - Metasm Demo', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => ['skape', 'Yoann Guillot', 'Julien Tinnes '], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/armle/shell_bind_tcp.rb b/modules/payloads/singles/osx/armle/shell_bind_tcp.rb index eac2ede26f..57a42e48e0 100644 --- a/modules/payloads/singles/osx/armle/shell_bind_tcp.rb +++ b/modules/payloads/singles/osx/armle/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Apple iOS Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb b/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb index dfd890453d..d3e414ec41 100644 --- a/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Apple iOS Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/armle/vibrate.rb b/modules/payloads/singles/osx/armle/vibrate.rb index 78e1e94b12..2d39522809 100644 --- a/modules/payloads/singles/osx/armle/vibrate.rb +++ b/modules/payloads/singles/osx/armle/vibrate.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Apple iOS iPhone Vibrate', - 'Version' => '$Revision$', 'Description' => %q| Causes the iPhone to vibrate, only works when the AudioToolkit library has been loaded. Based on work by Charlie Miller . diff --git a/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb b/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb index b09ba6bf37..172a85cf93 100644 --- a/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb +++ b/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb b/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb index 7f725789cf..09d70c56f3 100644 --- a/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x64/exec.rb b/modules/payloads/singles/osx/x64/exec.rb index 52ddade53b..c6ddc09c94 100644 --- a/modules/payloads/singles/osx/x64/exec.rb +++ b/modules/payloads/singles/osx/x64/exec.rb @@ -15,7 +15,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X x64 Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command', 'Author' => 'argp ', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x64/say.rb b/modules/payloads/singles/osx/x64/say.rb index 8c33032fee..13939bc380 100644 --- a/modules/payloads/singles/osx/x64/say.rb +++ b/modules/payloads/singles/osx/x64/say.rb @@ -15,7 +15,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OSX X64 say Shellcode', - 'Version' => '$Revision$', 'Description' => 'Say an arbitrary string outloud using Mac OS X text2speech', 'Author' => 'nemo ', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x64/shell_find_tag.rb b/modules/payloads/singles/osx/x64/shell_find_tag.rb index 9a6d5a9871..9224e29b2a 100644 --- a/modules/payloads/singles/osx/x64/shell_find_tag.rb +++ b/modules/payloads/singles/osx/x64/shell_find_tag.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OSX Command Shell, Find Tag Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection (proxy/nat safe)', 'Author' => 'nemo ', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x86/exec.rb b/modules/payloads/singles/osx/x86/exec.rb index 5b765dc65f..ec3764ac7e 100644 --- a/modules/payloads/singles/osx/x86/exec.rb +++ b/modules/payloads/singles/osx/x86/exec.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command', 'Author' => [ 'snagg ', 'argp ' ], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/osx/x86/shell_bind_tcp.rb b/modules/payloads/singles/osx/x86/shell_bind_tcp.rb index fc8031c227..1a670141df 100644 --- a/modules/payloads/singles/osx/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/osx/x86/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x86/shell_find_port.rb b/modules/payloads/singles/osx/x86/shell_find_port.rb index 4ed43089e8..f267005029 100644 --- a/modules/payloads/singles/osx/x86/shell_find_port.rb +++ b/modules/payloads/singles/osx/x86/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb b/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb index 24777e497d..740a2d190d 100644 --- a/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb b/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb index d8214498f7..7346c6b7c6 100644 --- a/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb +++ b/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X (vfork) Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection, vfork if necessary, and spawn a command shell', 'Author' => 'ddz', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb b/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb index 35ef212a7f..dfaebc3696 100644 --- a/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X (vfork) Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker, vfork if necessary, and spawn a command shell', 'Author' => 'ddz', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/php/bind_perl.rb b/modules/payloads/singles/php/bind_perl.rb index 587d27544d..e9e2c619a4 100644 --- a/modules/payloads/singles/php/bind_perl.rb +++ b/modules/payloads/singles/php/bind_perl.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Command Shell, Bind TCP (via Perl)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via perl (persistent)', 'Author' => ['Samy ', 'cazz'], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/bind_perl_ipv6.rb b/modules/payloads/singles/php/bind_perl_ipv6.rb index 9f6db0d773..0084726f30 100644 --- a/modules/payloads/singles/php/bind_perl_ipv6.rb +++ b/modules/payloads/singles/php/bind_perl_ipv6.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Command Shell, Bind TCP (via perl) IPv6', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via perl (persistent) over IPv6', 'Author' => ['Samy ', 'cazz'], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/bind_php.rb b/modules/payloads/singles/php/bind_php.rb index 458bb44c9b..2c5f927a99 100644 --- a/modules/payloads/singles/php/bind_php.rb +++ b/modules/payloads/singles/php/bind_php.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Command Shell, Bind TCP (via PHP)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via php', 'Author' => ['egypt', 'diaul ',], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/bind_php_ipv6.rb b/modules/payloads/singles/php/bind_php_ipv6.rb index 29a9146a61..8a3c4c6eef 100644 --- a/modules/payloads/singles/php/bind_php_ipv6.rb +++ b/modules/payloads/singles/php/bind_php_ipv6.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Command Shell, Bind TCP (via php) IPv6', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell via php (IPv6)', 'Author' => ['egypt', 'diaul ',], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/download_exec.rb b/modules/payloads/singles/php/download_exec.rb index 0eac8185b1..4cea94c7a1 100644 --- a/modules/payloads/singles/php/download_exec.rb +++ b/modules/payloads/singles/php/download_exec.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'PHP Executable Download and Execute', - 'Version' => '$Revision$', 'Description' => 'Download an EXE from an HTTP URL and execute it', 'Author' => [ 'egypt' ], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/exec.rb b/modules/payloads/singles/php/exec.rb index 1b43f391d9..70d0e1a243 100644 --- a/modules/payloads/singles/php/exec.rb +++ b/modules/payloads/singles/php/exec.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Execute Command ', - 'Version' => '$Revision$', 'Description' => 'Execute a single system command', 'Author' => [ 'egypt' ], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/meterpreter_reverse_tcp.rb b/modules/payloads/singles/php/meterpreter_reverse_tcp.rb index e5ed71d9d4..e7c10347a0 100644 --- a/modules/payloads/singles/php/meterpreter_reverse_tcp.rb +++ b/modules/payloads/singles/php/meterpreter_reverse_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'PHP Meterpreter, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a Meterpreter server (PHP)', 'Author' => ['egypt'], 'Platform' => 'php', diff --git a/modules/payloads/singles/php/reverse_perl.rb b/modules/payloads/singles/php/reverse_perl.rb index 39b4a08f10..8e22900208 100644 --- a/modules/payloads/singles/php/reverse_perl.rb +++ b/modules/payloads/singles/php/reverse_perl.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Command, Double reverse TCP connection (via Perl)', - 'Version' => '$Revision$', 'Description' => 'Creates an interactive shell via perl', 'Author' => 'cazz', 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/reverse_php.rb b/modules/payloads/singles/php/reverse_php.rb index 94eb491163..e5bc0f9485 100644 --- a/modules/payloads/singles/php/reverse_php.rb +++ b/modules/payloads/singles/php/reverse_php.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Command Shell, Reverse TCP (via PHP)', - 'Version' => '$Revision$', 'Description' => 'Reverse PHP connect back shell with checks for disabled functions', 'Author' => 'egypt', 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/php/shell_findsock.rb b/modules/payloads/singles/php/shell_findsock.rb index 2c0be219be..5c7c227649 100644 --- a/modules/payloads/singles/php/shell_findsock.rb +++ b/modules/payloads/singles/php/shell_findsock.rb @@ -21,7 +21,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Command Shell, Find Sock', - 'Version' => '$Revision$', 'Description' => %Q{ Spawn a shell on the established connection to the webserver. Unfortunately, this payload diff --git a/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb b/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb index d5edee3391..92b7ab8c2c 100644 --- a/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb +++ b/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Solaris Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/solaris/sparc/shell_find_port.rb b/modules/payloads/singles/solaris/sparc/shell_find_port.rb index fe5ebc4ea2..47d3ea35e8 100644 --- a/modules/payloads/singles/solaris/sparc/shell_find_port.rb +++ b/modules/payloads/singles/solaris/sparc/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Solaris Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb b/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb index 6c928723c1..27eb565091 100644 --- a/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Solaris Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb b/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb index 11c4db74c8..c6138aa319 100644 --- a/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Solaris Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/solaris/x86/shell_find_port.rb b/modules/payloads/singles/solaris/x86/shell_find_port.rb index 52f9012a9a..aa71ce0b0c 100644 --- a/modules/payloads/singles/solaris/x86/shell_find_port.rb +++ b/modules/payloads/singles/solaris/x86/shell_find_port.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Solaris Command Shell, Find Port Inline', - 'Version' => '$Revision$', 'Description' => 'Spawn a shell on an established connection', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb b/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb index e497335804..52b8a02417 100644 --- a/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Solaris Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => 'Ramon de C Valle', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/tty/unix/interact.rb b/modules/payloads/singles/tty/unix/interact.rb index 5a37c0a8e8..a9208f52d3 100644 --- a/modules/payloads/singles/tty/unix/interact.rb +++ b/modules/payloads/singles/tty/unix/interact.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Unix TTY, Interact with Established Connection', - 'Version' => '$Revision$', 'Description' => 'Interacts with a TTY on an established socket connection', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/adduser.rb b/modules/payloads/singles/windows/adduser.rb index 6111432366..47248dda3c 100644 --- a/modules/payloads/singles/windows/adduser.rb +++ b/modules/payloads/singles/windows/adduser.rb @@ -22,7 +22,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Windows Execute net user /ADD', - 'Version' => '$Revision$', 'Description' => %q{ Create a new user and add them to local administration group. diff --git a/modules/payloads/singles/windows/dns_txt_query_exec.rb b/modules/payloads/singles/windows/dns_txt_query_exec.rb index bb897820ad..213ff6dcf3 100644 --- a/modules/payloads/singles/windows/dns_txt_query_exec.rb +++ b/modules/payloads/singles/windows/dns_txt_query_exec.rb @@ -21,7 +21,6 @@ module Metasploit3 'corelanc0d3r ' ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Platform' => 'win', 'Arch' => ARCH_X86 )) diff --git a/modules/payloads/singles/windows/download_exec.rb b/modules/payloads/singles/windows/download_exec.rb index c3e1a29abe..cef4369431 100644 --- a/modules/payloads/singles/windows/download_exec.rb +++ b/modules/payloads/singles/windows/download_exec.rb @@ -22,7 +22,6 @@ module Metasploit3 'corelanc0d3r ' ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Platform' => 'win', 'Arch' => ARCH_X86 )) diff --git a/modules/payloads/singles/windows/exec.rb b/modules/payloads/singles/windows/exec.rb index fdd4bb3c6d..6993dfe898 100644 --- a/modules/payloads/singles/windows/exec.rb +++ b/modules/payloads/singles/windows/exec.rb @@ -15,7 +15,6 @@ require 'msf/core/payload/windows/exec' ### module Metasploit3 - # $Revision$ include Msf::Payload::Windows::Exec end diff --git a/modules/payloads/singles/windows/loadlibrary.rb b/modules/payloads/singles/windows/loadlibrary.rb index d50f190d8f..c1be8a48d2 100644 --- a/modules/payloads/singles/windows/loadlibrary.rb +++ b/modules/payloads/singles/windows/loadlibrary.rb @@ -15,7 +15,6 @@ require 'msf/core/payload/windows/loadlibrary' ### module Metasploit3 - # $Revision$ include Msf::Payload::Windows::LoadLibrary end diff --git a/modules/payloads/singles/windows/messagebox.rb b/modules/payloads/singles/windows/messagebox.rb index 7f30e51876..7aca7e92aa 100644 --- a/modules/payloads/singles/windows/messagebox.rb +++ b/modules/payloads/singles/windows/messagebox.rb @@ -24,7 +24,6 @@ module Metasploit3 'jduck' # some ruby factoring ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Platform' => 'win', 'Arch' => ARCH_X86 )) diff --git a/modules/payloads/singles/windows/metsvc_bind_tcp.rb b/modules/payloads/singles/windows/metsvc_bind_tcp.rb index 0356ea4d89..e3716440c0 100644 --- a/modules/payloads/singles/windows/metsvc_bind_tcp.rb +++ b/modules/payloads/singles/windows/metsvc_bind_tcp.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Meterpreter Service, Bind TCP', - 'Version' => '$Revision$', 'Description' => 'Stub payload for interacting with a Meterpreter Service', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/metsvc_reverse_tcp.rb b/modules/payloads/singles/windows/metsvc_reverse_tcp.rb index 57fc24b0fb..8c454fae4b 100644 --- a/modules/payloads/singles/windows/metsvc_reverse_tcp.rb +++ b/modules/payloads/singles/windows/metsvc_reverse_tcp.rb @@ -20,7 +20,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Meterpreter Service, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Stub payload for interacting with a Meterpreter Service', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/shell_bind_tcp.rb b/modules/payloads/singles/windows/shell_bind_tcp.rb index 5c4166ba7d..3322a3c5e1 100644 --- a/modules/payloads/singles/windows/shell_bind_tcp.rb +++ b/modules/payloads/singles/windows/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell', 'Author' => [ 'vlad902', 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb b/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb index 81d15d37ea..01901df2b1 100644 --- a/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb +++ b/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Disable Windows ICF, Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Disable the Windows ICF, then listen for a connection and spawn a command shell', 'Author' => 'Lin0xx ', 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/shell_reverse_tcp.rb b/modules/payloads/singles/windows/shell_reverse_tcp.rb index fe7ec5efa2..a8ce243c83 100644 --- a/modules/payloads/singles/windows/shell_reverse_tcp.rb +++ b/modules/payloads/singles/windows/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => [ 'vlad902', 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/speak_pwned.rb b/modules/payloads/singles/windows/speak_pwned.rb index 5f872a1d26..e49248c325 100644 --- a/modules/payloads/singles/windows/speak_pwned.rb +++ b/modules/payloads/singles/windows/speak_pwned.rb @@ -48,7 +48,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Windows Speech API - Say "You Got Pwned!"', - 'Version' => '$Revision$', 'Description' => 'Causes the target to say "You Got Pwned" via the Windows Speech API', 'Author' => [ 'Berend-Jan "SkyLined" Wever ' ], 'License' => BSD_LICENSE, diff --git a/modules/payloads/singles/windows/x64/exec.rb b/modules/payloads/singles/windows/x64/exec.rb index d81438b4b3..f4c4c6bad5 100644 --- a/modules/payloads/singles/windows/x64/exec.rb +++ b/modules/payloads/singles/windows/x64/exec.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows x64 Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command (Windows x64)', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/x64/loadlibrary.rb b/modules/payloads/singles/windows/x64/loadlibrary.rb index c3d296e34d..0bf3965f68 100644 --- a/modules/payloads/singles/windows/x64/loadlibrary.rb +++ b/modules/payloads/singles/windows/x64/loadlibrary.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows x64 LoadLibrary Path', - 'Version' => '$Revision$', 'Description' => 'Load an arbitrary x64 library path', 'Author' => [ 'scriptjunkie', 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/x64/shell_bind_tcp.rb b/modules/payloads/singles/windows/x64/shell_bind_tcp.rb index 71f8d7590a..9234348a01 100644 --- a/modules/payloads/singles/windows/x64/shell_bind_tcp.rb +++ b/modules/payloads/singles/windows/x64/shell_bind_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows x64 Command Shell, Bind TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection and spawn a command shell (Windows x64)', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb b/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb index 2a6355e102..1273392260 100644 --- a/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb +++ b/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows x64 Command Shell, Reverse TCP Inline', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker and spawn a command shell (Windows x64)', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb b/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb index 6efad317e5..54d28de9fa 100644 --- a/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb @@ -29,7 +29,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection over IPv6', 'Author' => ['skape', 'vlad902', 'hdm'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/bsd/x86/bind_tcp.rb b/modules/payloads/stagers/bsd/x86/bind_tcp.rb index e086f3e4cb..715d5aae55 100644 --- a/modules/payloads/stagers/bsd/x86/bind_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/bind_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/bsd/x86/find_tag.rb b/modules/payloads/stagers/bsd/x86/find_tag.rb index cda934bcbc..7bbe5db2ec 100644 --- a/modules/payloads/stagers/bsd/x86/find_tag.rb +++ b/modules/payloads/stagers/bsd/x86/find_tag.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Find Tag Stager', - 'Version' => '$Revision$', 'Description' => 'Use an established connection', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb b/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb index 8dcd032031..8fa290acf6 100644 --- a/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb @@ -30,7 +30,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker over IPv6', 'Author' => ['skape', 'vlad902', 'hdm'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/bsd/x86/reverse_tcp.rb b/modules/payloads/stagers/bsd/x86/reverse_tcp.rb index 307591c9d6..1e52219699 100644 --- a/modules/payloads/stagers/bsd/x86/reverse_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/reverse_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/bsdi/x86/bind_tcp.rb b/modules/payloads/stagers/bsdi/x86/bind_tcp.rb index 9cf2ccc2ff..6498a1d2aa 100644 --- a/modules/payloads/stagers/bsdi/x86/bind_tcp.rb +++ b/modules/payloads/stagers/bsdi/x86/bind_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb b/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb index fd51fa7db8..a4f81f0af9 100644 --- a/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb +++ b/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/java/bind_tcp.rb b/modules/payloads/stagers/java/bind_tcp.rb index ce670274f3..81f4c26e70 100644 --- a/modules/payloads/stagers/java/bind_tcp.rb +++ b/modules/payloads/stagers/java/bind_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Java Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => [ 'mihi', # all the hard work diff --git a/modules/payloads/stagers/java/reverse_http.rb b/modules/payloads/stagers/java/reverse_http.rb index e0868e8a8e..04a8e33ef4 100644 --- a/modules/payloads/stagers/java/reverse_http.rb +++ b/modules/payloads/stagers/java/reverse_http.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Java Reverse HTTP Stager', - 'Version' => '$Revision$', 'Description' => 'Tunnel communication over HTTP', 'Author' => [ 'mihi', # all the hard work diff --git a/modules/payloads/stagers/java/reverse_https.rb b/modules/payloads/stagers/java/reverse_https.rb index eeb91f4613..173abe2a11 100644 --- a/modules/payloads/stagers/java/reverse_https.rb +++ b/modules/payloads/stagers/java/reverse_https.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Java Reverse HTTPS Stager', - 'Version' => '$Revision$', 'Description' => 'Tunnel communication over HTTPS', 'Author' => [ 'mihi', # all the hard work diff --git a/modules/payloads/stagers/java/reverse_tcp.rb b/modules/payloads/stagers/java/reverse_tcp.rb index 87e2c90e4e..fda226b792 100644 --- a/modules/payloads/stagers/java/reverse_tcp.rb +++ b/modules/payloads/stagers/java/reverse_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Java Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back stager', 'Author' => [ 'mihi', # all the hard work diff --git a/modules/payloads/stagers/linux/x64/bind_tcp.rb b/modules/payloads/stagers/linux/x64/bind_tcp.rb index 490a260b36..875e86c5b2 100644 --- a/modules/payloads/stagers/linux/x64/bind_tcp.rb +++ b/modules/payloads/stagers/linux/x64/bind_tcp.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => 'ricky', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/linux/x64/reverse_tcp.rb b/modules/payloads/stagers/linux/x64/reverse_tcp.rb index b13ea45308..6a7604afd0 100644 --- a/modules/payloads/stagers/linux/x64/reverse_tcp.rb +++ b/modules/payloads/stagers/linux/x64/reverse_tcp.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'ricky', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb b/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb index f5d9feb61c..d4da6df25b 100644 --- a/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb +++ b/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb @@ -21,7 +21,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection over IPv6', 'Author' => [ 'kris katterjohn', # original diff --git a/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb b/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb index a947b5c3b9..98d116b415 100644 --- a/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb +++ b/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb @@ -30,7 +30,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/linux/x86/bind_tcp.rb b/modules/payloads/stagers/linux/x86/bind_tcp.rb index ab0e44046d..ddf1aa9a24 100644 --- a/modules/payloads/stagers/linux/x86/bind_tcp.rb +++ b/modules/payloads/stagers/linux/x86/bind_tcp.rb @@ -26,7 +26,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => [ 'skape', # original diff --git a/modules/payloads/stagers/linux/x86/find_tag.rb b/modules/payloads/stagers/linux/x86/find_tag.rb index fa4ae20e1f..11bd5b381f 100644 --- a/modules/payloads/stagers/linux/x86/find_tag.rb +++ b/modules/payloads/stagers/linux/x86/find_tag.rb @@ -26,7 +26,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Find Tag Stager', - 'Version' => '$Revision$', 'Description' => 'Use an established connection', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/linux/x86/reverse_ipv6_tcp.rb b/modules/payloads/stagers/linux/x86/reverse_ipv6_tcp.rb index fd79028bab..e133d29c51 100644 --- a/modules/payloads/stagers/linux/x86/reverse_ipv6_tcp.rb +++ b/modules/payloads/stagers/linux/x86/reverse_ipv6_tcp.rb @@ -21,7 +21,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Connect back to attacker over IPv6', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb b/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb index 3e7aa7e599..8b0dc22abb 100644 --- a/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb +++ b/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb @@ -30,7 +30,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/linux/x86/reverse_tcp.rb b/modules/payloads/stagers/linux/x86/reverse_tcp.rb index a89f8b611d..53da3eeb00 100644 --- a/modules/payloads/stagers/linux/x86/reverse_tcp.rb +++ b/modules/payloads/stagers/linux/x86/reverse_tcp.rb @@ -26,7 +26,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => [ 'skape', # original diff --git a/modules/payloads/stagers/netware/reverse_tcp.rb b/modules/payloads/stagers/netware/reverse_tcp.rb index 3d14848544..c4b9316b15 100644 --- a/modules/payloads/stagers/netware/reverse_tcp.rb +++ b/modules/payloads/stagers/netware/reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'toto', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/armle/bind_tcp.rb b/modules/payloads/stagers/osx/armle/bind_tcp.rb index a699bed676..dc4b32c2bf 100644 --- a/modules/payloads/stagers/osx/armle/bind_tcp.rb +++ b/modules/payloads/stagers/osx/armle/bind_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/armle/reverse_tcp.rb b/modules/payloads/stagers/osx/armle/reverse_tcp.rb index 440d642d97..b625c22156 100644 --- a/modules/payloads/stagers/osx/armle/reverse_tcp.rb +++ b/modules/payloads/stagers/osx/armle/reverse_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/ppc/bind_tcp.rb b/modules/payloads/stagers/osx/ppc/bind_tcp.rb index 7b157595ce..881c3c4fc6 100644 --- a/modules/payloads/stagers/osx/ppc/bind_tcp.rb +++ b/modules/payloads/stagers/osx/ppc/bind_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/ppc/find_tag.rb b/modules/payloads/stagers/osx/ppc/find_tag.rb index ad46d8d8c5..e929d86a13 100644 --- a/modules/payloads/stagers/osx/ppc/find_tag.rb +++ b/modules/payloads/stagers/osx/ppc/find_tag.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Find Tag Stager', - 'Version' => '$Revision$', 'Description' => 'Use an established connection', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/ppc/reverse_tcp.rb b/modules/payloads/stagers/osx/ppc/reverse_tcp.rb index 574071e770..9f53a20067 100644 --- a/modules/payloads/stagers/osx/ppc/reverse_tcp.rb +++ b/modules/payloads/stagers/osx/ppc/reverse_tcp.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/x64/bind_tcp.rb b/modules/payloads/stagers/osx/x64/bind_tcp.rb index 99174393eb..98dcbec86d 100644 --- a/modules/payloads/stagers/osx/x64/bind_tcp.rb +++ b/modules/payloads/stagers/osx/x64/bind_tcp.rb @@ -15,7 +15,6 @@ module Metasploit3 def initialize(info = { }) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen, read length, read buffer, execute', 'Author' => 'nemo ', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/x64/reverse_tcp.rb b/modules/payloads/stagers/osx/x64/reverse_tcp.rb index 0370a881ba..186a880054 100644 --- a/modules/payloads/stagers/osx/x64/reverse_tcp.rb +++ b/modules/payloads/stagers/osx/x64/reverse_tcp.rb @@ -15,7 +15,6 @@ module Metasploit3 def initialize(info = { }) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect, read length, read buffer, execute', 'Author' => 'nemo ', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/x86/bind_tcp.rb b/modules/payloads/stagers/osx/x86/bind_tcp.rb index 6dfd8234d3..88c8a78f84 100644 --- a/modules/payloads/stagers/osx/x86/bind_tcp.rb +++ b/modules/payloads/stagers/osx/x86/bind_tcp.rb @@ -23,7 +23,6 @@ module Metasploit3 def initialize(info = { }) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen, read length, read buffer, execute', 'Author' => 'ddz', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/osx/x86/reverse_tcp.rb b/modules/payloads/stagers/osx/x86/reverse_tcp.rb index e739859f40..f50f918eea 100644 --- a/modules/payloads/stagers/osx/x86/reverse_tcp.rb +++ b/modules/payloads/stagers/osx/x86/reverse_tcp.rb @@ -23,7 +23,6 @@ module Metasploit3 def initialize(info = { }) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect, read length, read buffer, execute', 'Author' => 'ddz', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/php/bind_tcp.rb b/modules/payloads/stagers/php/bind_tcp.rb index e07bd47c46..0567e4dfcb 100644 --- a/modules/payloads/stagers/php/bind_tcp.rb +++ b/modules/payloads/stagers/php/bind_tcp.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => ['egypt'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/php/bind_tcp_ipv6.rb b/modules/payloads/stagers/php/bind_tcp_ipv6.rb index e90b0ecdac..b5788486b0 100644 --- a/modules/payloads/stagers/php/bind_tcp_ipv6.rb +++ b/modules/payloads/stagers/php/bind_tcp_ipv6.rb @@ -21,7 +21,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager IPv6', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection over IPv6', 'Author' => ['egypt'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/php/reverse_tcp.rb b/modules/payloads/stagers/php/reverse_tcp.rb index 751e71fd85..0ccb5ee617 100644 --- a/modules/payloads/stagers/php/reverse_tcp.rb +++ b/modules/payloads/stagers/php/reverse_tcp.rb @@ -19,7 +19,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'PHP Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Reverse PHP connect back stager with checks for disabled functions', 'Author' => 'egypt', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/bind_ipv6_tcp.rb b/modules/payloads/stagers/windows/bind_ipv6_tcp.rb index 88aaff889d..9ddd30dec0 100644 --- a/modules/payloads/stagers/windows/bind_ipv6_tcp.rb +++ b/modules/payloads/stagers/windows/bind_ipv6_tcp.rb @@ -22,7 +22,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection over IPv6', 'Author' => ['hdm', 'skape'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/bind_nonx_tcp.rb b/modules/payloads/stagers/windows/bind_nonx_tcp.rb index 30f9e5a36e..f0cc04dfa9 100644 --- a/modules/payloads/stagers/windows/bind_nonx_tcp.rb +++ b/modules/payloads/stagers/windows/bind_nonx_tcp.rb @@ -22,7 +22,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager (No NX or Win7)', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection (No NX)', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/bind_tcp.rb b/modules/payloads/stagers/windows/bind_tcp.rb index 6fa8536470..8192c104b9 100644 --- a/modules/payloads/stagers/windows/bind_tcp.rb +++ b/modules/payloads/stagers/windows/bind_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection', 'Author' => ['hdm', 'skape', 'sf'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/findtag_ord.rb b/modules/payloads/stagers/windows/findtag_ord.rb index 5b430bb625..13e1ce4f6f 100644 --- a/modules/payloads/stagers/windows/findtag_ord.rb +++ b/modules/payloads/stagers/windows/findtag_ord.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Find Tag Ordinal Stager', - 'Version' => '$Revision$', 'Description' => 'Use an established connection', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_http.rb b/modules/payloads/stagers/windows/reverse_http.rb index ce8b4f67e1..10555580aa 100644 --- a/modules/payloads/stagers/windows/reverse_http.rb +++ b/modules/payloads/stagers/windows/reverse_http.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse HTTP Stager', - 'Version' => '$Revision$', 'Description' => 'Tunnel communication over HTTP', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_https.rb b/modules/payloads/stagers/windows/reverse_https.rb index 92f0392c47..7de4c88665 100644 --- a/modules/payloads/stagers/windows/reverse_https.rb +++ b/modules/payloads/stagers/windows/reverse_https.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse HTTPS Stager', - 'Version' => '$Revision$', 'Description' => 'Tunnel communication over HTTP using SSL', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_ipv6_http.rb b/modules/payloads/stagers/windows/reverse_ipv6_http.rb index 55bf4e0721..a9f4b22f75 100644 --- a/modules/payloads/stagers/windows/reverse_ipv6_http.rb +++ b/modules/payloads/stagers/windows/reverse_ipv6_http.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse HTTP Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Tunnel communication over HTTP and IPv6', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_ipv6_https.rb b/modules/payloads/stagers/windows/reverse_ipv6_https.rb index 42b1849f60..b44a445bdf 100644 --- a/modules/payloads/stagers/windows/reverse_ipv6_https.rb +++ b/modules/payloads/stagers/windows/reverse_ipv6_https.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse HTTPS Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Tunnel communication over HTTP using SSL and IPv6', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb b/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb index 7f0d1d5fbb..f25266394e 100644 --- a/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb +++ b/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb @@ -23,7 +23,6 @@ module Metasploit3 super(merge_info(info, 'Name' => 'Reverse TCP Stager (IPv6)', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker over IPv6', 'Author' => ['hdm', 'skape', 'sf'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_nonx_tcp.rb b/modules/payloads/stagers/windows/reverse_nonx_tcp.rb index 0cf63500aa..6f3ebb2fab 100644 --- a/modules/payloads/stagers/windows/reverse_nonx_tcp.rb +++ b/modules/payloads/stagers/windows/reverse_nonx_tcp.rb @@ -23,7 +23,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager (No NX or Win7)', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker (No NX)', 'Author' => 'vlad902', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_ord_tcp.rb b/modules/payloads/stagers/windows/reverse_ord_tcp.rb index cebe5294c0..ee7057c01d 100644 --- a/modules/payloads/stagers/windows/reverse_ord_tcp.rb +++ b/modules/payloads/stagers/windows/reverse_ord_tcp.rb @@ -22,7 +22,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse Ordinal TCP Stager (No NX or Win7)', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => 'spoonm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_tcp.rb b/modules/payloads/stagers/windows/reverse_tcp.rb index ed6da7da18..3b45e5eb59 100644 --- a/modules/payloads/stagers/windows/reverse_tcp.rb +++ b/modules/payloads/stagers/windows/reverse_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => ['hdm', 'skape', 'sf'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_tcp_allports.rb b/modules/payloads/stagers/windows/reverse_tcp_allports.rb index 172e1efbda..2e78459f1a 100644 --- a/modules/payloads/stagers/windows/reverse_tcp_allports.rb +++ b/modules/payloads/stagers/windows/reverse_tcp_allports.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse All-Port TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Try to connect back to the attacker, on all possible ports (1-65535, slowly)', 'Author' => ['hdm', 'skape', 'sf'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/reverse_tcp_dns.rb b/modules/payloads/stagers/windows/reverse_tcp_dns.rb index 3f96489fed..9a51eff845 100644 --- a/modules/payloads/stagers/windows/reverse_tcp_dns.rb +++ b/modules/payloads/stagers/windows/reverse_tcp_dns.rb @@ -22,7 +22,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Reverse TCP Stager (DNS)', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker', 'Author' => ['hdm', 'skape', 'sf'], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/x64/bind_tcp.rb b/modules/payloads/stagers/windows/x64/bind_tcp.rb index 3bfab052d9..d619c1accb 100644 --- a/modules/payloads/stagers/windows/x64/bind_tcp.rb +++ b/modules/payloads/stagers/windows/x64/bind_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows x64 Bind TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Listen for a connection (Windows x64)', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stagers/windows/x64/reverse_tcp.rb b/modules/payloads/stagers/windows/x64/reverse_tcp.rb index 2da6d6f5ee..29f4ad7906 100644 --- a/modules/payloads/stagers/windows/x64/reverse_tcp.rb +++ b/modules/payloads/stagers/windows/x64/reverse_tcp.rb @@ -18,7 +18,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows x64 Reverse TCP Stager', - 'Version' => '$Revision$', 'Description' => 'Connect back to the attacker (Windows x64)', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/bsd/x86/shell.rb b/modules/payloads/stages/bsd/x86/shell.rb index 204026ede6..752933e4e1 100644 --- a/modules/payloads/stages/bsd/x86/shell.rb +++ b/modules/payloads/stages/bsd/x86/shell.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSD Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a command shell (staged)', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/bsdi/x86/shell.rb b/modules/payloads/stages/bsdi/x86/shell.rb index 976a1c6d50..5e441d082b 100644 --- a/modules/payloads/stages/bsdi/x86/shell.rb +++ b/modules/payloads/stages/bsdi/x86/shell.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'BSDi Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a command shell (staged)', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/java/meterpreter.rb b/modules/payloads/stages/java/meterpreter.rb index 6ce21d9f38..77c52949dd 100644 --- a/modules/payloads/stages/java/meterpreter.rb +++ b/modules/payloads/stages/java/meterpreter.rb @@ -21,7 +21,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Java Meterpreter', - 'Version' => '$Revision$', 'Description' => 'Run a meterpreter server in Java', 'Author' => [ 'mihi', # all the hard work diff --git a/modules/payloads/stages/java/shell.rb b/modules/payloads/stages/java/shell.rb index 9872c881ff..05dd667fe8 100644 --- a/modules/payloads/stages/java/shell.rb +++ b/modules/payloads/stages/java/shell.rb @@ -22,7 +22,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a piped command shell (cmd.exe on Windows, /bin/sh everywhere else)', 'Author' => [ 'mihi', # all the hard work diff --git a/modules/payloads/stages/linux/x64/shell.rb b/modules/payloads/stages/linux/x64/shell.rb index d5088cb6aa..8ab03efa17 100644 --- a/modules/payloads/stages/linux/x64/shell.rb +++ b/modules/payloads/stages/linux/x64/shell.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a command shell (staged)', 'Author' => 'ricky', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/linux/x86/meterpreter.rb b/modules/payloads/stages/linux/x86/meterpreter.rb index 518bcddca2..d83583fec3 100644 --- a/modules/payloads/stages/linux/x86/meterpreter.rb +++ b/modules/payloads/stages/linux/x86/meterpreter.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Linux Meterpreter', - 'Version' => '$Revision$', 'Description' => 'Staged meterpreter server', 'Author' => ['PKS', 'egypt'], 'Platform' => 'linux', diff --git a/modules/payloads/stages/linux/x86/shell.rb b/modules/payloads/stages/linux/x86/shell.rb index cbcc8a5b2c..c4a1a98d6d 100644 --- a/modules/payloads/stages/linux/x86/shell.rb +++ b/modules/payloads/stages/linux/x86/shell.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a command shell (staged)', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/netware/shell.rb b/modules/payloads/stages/netware/shell.rb index b6ca10de12..7edafc0aed 100644 --- a/modules/payloads/stages/netware/shell.rb +++ b/modules/payloads/stages/netware/shell.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'NetWare Command Shell', - 'Version' => '$Revision$', 'Description' => 'Connect to the NetWare console (staged)', 'Author' => 'toto', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/osx/armle/execute.rb b/modules/payloads/stages/osx/armle/execute.rb index e32fa740b6..af2e938d33 100644 --- a/modules/payloads/stages/osx/armle/execute.rb +++ b/modules/payloads/stages/osx/armle/execute.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Write and Execute Binary', - 'Version' => '$Revision$', 'Description' => 'Spawn a command shell (staged)', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/osx/armle/shell.rb b/modules/payloads/stages/osx/armle/shell.rb index 1a3e176da4..46c282758b 100644 --- a/modules/payloads/stages/osx/armle/shell.rb +++ b/modules/payloads/stages/osx/armle/shell.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a command shell (staged)', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/osx/ppc/shell.rb b/modules/payloads/stages/osx/ppc/shell.rb index 4fc8efe2bf..50a977a4e5 100644 --- a/modules/payloads/stages/osx/ppc/shell.rb +++ b/modules/payloads/stages/osx/ppc/shell.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a command shell (staged)', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/osx/x64/dupandexecve.rb b/modules/payloads/stages/osx/x64/dupandexecve.rb index 9896416869..ced651945e 100644 --- a/modules/payloads/stages/osx/x64/dupandexecve.rb +++ b/modules/payloads/stages/osx/x64/dupandexecve.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X dup2 Command Shell', - 'Version' => '$Revision$', 'Description' => 'dup2 socket in edi, then execve', 'Author' => 'nemo', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/osx/x86/bundleinject.rb b/modules/payloads/stages/osx/x86/bundleinject.rb index bd0e5b3eb1..47e1c26a76 100644 --- a/modules/payloads/stages/osx/x86/bundleinject.rb +++ b/modules/payloads/stages/osx/x86/bundleinject.rb @@ -15,7 +15,6 @@ require 'msf/core/payload/osx/bundleinject' ### module Metasploit3 - # $Revision$ include Msf::Payload::Osx::BundleInject end diff --git a/modules/payloads/stages/osx/x86/isight.rb b/modules/payloads/stages/osx/x86/isight.rb index 71e36caae2..ea3bc6a195 100644 --- a/modules/payloads/stages/osx/x86/isight.rb +++ b/modules/payloads/stages/osx/x86/isight.rb @@ -26,7 +26,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Mac OS X x86 iSight Photo Capture', - 'Version' => '$Revision$', 'Description' => 'Inject a Mach-O bundle to capture a photo from the iSight (staged)', 'Author' => 'ddz', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/osx/x86/vforkshell.rb b/modules/payloads/stages/osx/x86/vforkshell.rb index 06ba553a8a..30ee0f44e8 100644 --- a/modules/payloads/stages/osx/x86/vforkshell.rb +++ b/modules/payloads/stages/osx/x86/vforkshell.rb @@ -16,7 +16,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'OS X (vfork) Command Shell', - 'Version' => '$Revision$', 'Description' => 'Call vfork() if necessary and spawn a command shell (staged)', 'Author' => 'ddz', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/php/meterpreter.rb b/modules/payloads/stages/php/meterpreter.rb index 8a579589bc..46e418764d 100644 --- a/modules/payloads/stages/php/meterpreter.rb +++ b/modules/payloads/stages/php/meterpreter.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'PHP Meterpreter', - 'Version' => '$Revision$', 'Description' => 'Run a meterpreter server in PHP', 'Author' => ['egypt'], 'Platform' => 'php', diff --git a/modules/payloads/stages/windows/dllinject.rb b/modules/payloads/stages/windows/dllinject.rb index b46b21163e..f8e1e14c66 100644 --- a/modules/payloads/stages/windows/dllinject.rb +++ b/modules/payloads/stages/windows/dllinject.rb @@ -17,7 +17,6 @@ require 'msf/core/payload/windows/reflectivedllinject' ### module Metasploit3 - # $Revision$ include Msf::Payload::Windows::ReflectiveDllInject end diff --git a/modules/payloads/stages/windows/meterpreter.rb b/modules/payloads/stages/windows/meterpreter.rb index 41fc1d4f89..2db5846006 100644 --- a/modules/payloads/stages/windows/meterpreter.rb +++ b/modules/payloads/stages/windows/meterpreter.rb @@ -24,7 +24,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Windows Meterpreter (Reflective Injection)', - 'Version' => '$Revision$', 'Description' => 'Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged)', 'Author' => ['skape','sf'], 'PayloadCompat' => diff --git a/modules/payloads/stages/windows/patchupdllinject.rb b/modules/payloads/stages/windows/patchupdllinject.rb index f55c463a8d..1228e6431d 100644 --- a/modules/payloads/stages/windows/patchupdllinject.rb +++ b/modules/payloads/stages/windows/patchupdllinject.rb @@ -15,7 +15,6 @@ require 'msf/core/payload/windows/dllinject' ### module Metasploit3 - # $Revision$ include Msf::Payload::Windows::DllInject end diff --git a/modules/payloads/stages/windows/patchupmeterpreter.rb b/modules/payloads/stages/windows/patchupmeterpreter.rb index 2d620b23dc..be0b63ac4b 100644 --- a/modules/payloads/stages/windows/patchupmeterpreter.rb +++ b/modules/payloads/stages/windows/patchupmeterpreter.rb @@ -24,7 +24,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Windows Meterpreter (skape/jt Injection)', - 'Version' => '$Revision$', 'Description' => 'Inject the meterpreter server DLL (staged)', 'Author' => 'skape', 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/windows/shell.rb b/modules/payloads/stages/windows/shell.rb index e3c587abdb..f99576454a 100644 --- a/modules/payloads/stages/windows/shell.rb +++ b/modules/payloads/stages/windows/shell.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a piped command shell (staged)', 'Author' => [ 'spoonm', 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/windows/upexec.rb b/modules/payloads/stages/windows/upexec.rb index f9946a0c69..4a16572faf 100644 --- a/modules/payloads/stages/windows/upexec.rb +++ b/modules/payloads/stages/windows/upexec.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows Upload/Execute', - 'Version' => '$Revision$', 'Description' => 'Uploads an executable and runs it (staged)', 'Author' => ['vlad902', 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/windows/vncinject.rb b/modules/payloads/stages/windows/vncinject.rb index 87cf0082d9..2d4bb4c844 100644 --- a/modules/payloads/stages/windows/vncinject.rb +++ b/modules/payloads/stages/windows/vncinject.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'VNC Server (Reflective Injection)', - 'Version' => '$Revision$', 'Description' => 'Inject a VNC Dll via a reflective loader (staged)', 'Author' => [ 'sf' ], 'Session' => Msf::Sessions::VncInject )) diff --git a/modules/payloads/stages/windows/x64/meterpreter.rb b/modules/payloads/stages/windows/x64/meterpreter.rb index bc7a6dcb3c..83715fca48 100644 --- a/modules/payloads/stages/windows/x64/meterpreter.rb +++ b/modules/payloads/stages/windows/x64/meterpreter.rb @@ -25,7 +25,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Windows x64 Meterpreter', - 'Version' => '$Revision$', 'Description' => 'Inject the meterpreter server DLL via the Reflective Dll Injection payload (Windows x64) (staged)', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/windows/x64/shell.rb b/modules/payloads/stages/windows/x64/shell.rb index 5b5ded3cea..c6120a7355 100644 --- a/modules/payloads/stages/windows/x64/shell.rb +++ b/modules/payloads/stages/windows/x64/shell.rb @@ -17,7 +17,6 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Windows x64 Command Shell', - 'Version' => '$Revision$', 'Description' => 'Spawn a piped command shell (Windows x64) (staged)', 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, diff --git a/modules/payloads/stages/windows/x64/vncinject.rb b/modules/payloads/stages/windows/x64/vncinject.rb index 050bd09c20..2ae3e5bb49 100644 --- a/modules/payloads/stages/windows/x64/vncinject.rb +++ b/modules/payloads/stages/windows/x64/vncinject.rb @@ -23,7 +23,6 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Windows x64 VNC Server (Reflective Injection)', - 'Version' => '$Revision$', 'Description' => 'Inject a VNC Dll via a reflective loader (Windows x64) (staged)', 'Author' => [ 'sf' ], 'Session' => Msf::Sessions::VncInject )) diff --git a/modules/post/aix/hashdump.rb b/modules/post/aix/hashdump.rb index 33e3b7aae2..6f08ded7c7 100644 --- a/modules/post/aix/hashdump.rb +++ b/modules/post/aix/hashdump.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ Post Module to dump the password hashes for all users on an AIX System}, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'aix' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/cisco/gather/enum_cisco.rb b/modules/post/cisco/gather/enum_cisco.rb index 0450469bac..c9cabb9ac7 100644 --- a/modules/post/cisco/gather/enum_cisco.rb +++ b/modules/post/cisco/gather/enum_cisco.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'cisco'], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/linux/gather/checkvm.rb b/modules/post/linux/gather/checkvm.rb index 3e0a17b254..b1caef36a3 100644 --- a/modules/post/linux/gather/checkvm.rb +++ b/modules/post/linux/gather/checkvm.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Post and QEMU/KVM.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'linux' ], 'SessionTypes' => [ 'shell', 'meterpreter' ] )) diff --git a/modules/post/linux/gather/enum_network.rb b/modules/post/linux/gather/enum_network.rb index 7d1a1c59e0..1c89a65727 100644 --- a/modules/post/linux/gather/enum_network.rb +++ b/modules/post/linux/gather/enum_network.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Post 'ohdae ', # minor additions, modifications & testing 'Stephen Haywood ', # enum_linux ], - 'Version' => '$Revision$', 'Platform' => [ 'linux' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/linux/gather/enum_system.rb b/modules/post/linux/gather/enum_system.rb index 41936215d0..c805b2d672 100644 --- a/modules/post/linux/gather/enum_system.rb +++ b/modules/post/linux/gather/enum_system.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Post 'sinn3r', # Testing and modification of original enum_linux 'ohdae ', # Combined separate mods, modifications and testing ], - 'Version' => '$Revision$', 'Platform' => [ 'linux' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/linux/gather/enum_users_history.rb b/modules/post/linux/gather/enum_users_history.rb index b7198a99fc..a6f181b302 100644 --- a/modules/post/linux/gather/enum_users_history.rb +++ b/modules/post/linux/gather/enum_users_history.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Post # based largely on get_bash_history function by Stephen Haywood 'ohdae ' ], - 'Version' => '$Revision$', 'Platform' => [ 'linux' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/linux/gather/hashdump.rb b/modules/post/linux/gather/hashdump.rb index b336aa0ce7..fb25a0a688 100644 --- a/modules/post/linux/gather/hashdump.rb +++ b/modules/post/linux/gather/hashdump.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ Post Module to dump the password hashes for all users on a Linux System}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'linux' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/multi/gather/apple_ios_backup.rb b/modules/post/multi/gather/apple_ios_backup.rb index 3e6088542b..2346a4293c 100644 --- a/modules/post/multi/gather/apple_ios_backup.rb +++ b/modules/post/multi/gather/apple_ios_backup.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post 'hdm', 'bannedit' # Based on bannedit's pidgin_cred module structure ], - 'Version' => '$Revision$', 'Platform' => ['win', 'osx'], 'SessionTypes' => ['meterpreter', 'shell'] )) diff --git a/modules/post/multi/gather/dns_bruteforce.rb b/modules/post/multi/gather/dns_bruteforce.rb index 89f062840b..c20dc9f0f9 100644 --- a/modules/post/multi/gather/dns_bruteforce.rb +++ b/modules/post/multi/gather/dns_bruteforce.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win','linux', 'osx', 'bsd', 'solaris' ], 'SessionTypes' => [ 'meterpreter', 'shell' ] )) diff --git a/modules/post/multi/gather/dns_reverse_lookup.rb b/modules/post/multi/gather/dns_reverse_lookup.rb index e979d96f10..9efffbf109 100644 --- a/modules/post/multi/gather/dns_reverse_lookup.rb +++ b/modules/post/multi/gather/dns_reverse_lookup.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win','linux', 'osx', 'bsd', 'solaris' ], 'SessionTypes' => [ 'meterpreter', 'shell' ] )) diff --git a/modules/post/multi/gather/dns_srv_lookup.rb b/modules/post/multi/gather/dns_srv_lookup.rb index 9f5f1dccb6..693ee1a91f 100644 --- a/modules/post/multi/gather/dns_srv_lookup.rb +++ b/modules/post/multi/gather/dns_srv_lookup.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win','linux', 'osx', 'bsd', 'solaris' ], 'SessionTypes' => [ 'meterpreter','shell' ] )) diff --git a/modules/post/multi/gather/enum_vbox.rb b/modules/post/multi/gather/enum_vbox.rb index e275987c41..4bb07f689a 100644 --- a/modules/post/multi/gather/enum_vbox.rb +++ b/modules/post/multi/gather/enum_vbox.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => ['unix', 'bsd', 'linux', 'osx', 'win'], 'SessionTypes' => ['shell', 'meterpreter' ] )) diff --git a/modules/post/multi/gather/env.rb b/modules/post/multi/gather/env.rb index 89b0d792f4..c8141827ef 100644 --- a/modules/post/multi/gather/env.rb +++ b/modules/post/multi/gather/env.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module prints out the operating system environment variables }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez ', 'egypt' ], - 'Version' => '$Revision$', 'Platform' => [ 'linux', 'win' ], 'SessionTypes' => [ 'shell', 'meterpreter' ] )) diff --git a/modules/post/multi/gather/filezilla_client_cred.rb b/modules/post/multi/gather/filezilla_client_cred.rb index 598378d67b..252525e38b 100644 --- a/modules/post/multi/gather/filezilla_client_cred.rb +++ b/modules/post/multi/gather/filezilla_client_cred.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post 'bannedit', # post port, added support for shell sessions 'Carlos Perez ' # original meterpreter script ], - 'Version' => '$Revision$', 'Platform' => ['unix', 'bsd', 'linux', 'osx', 'win'], 'SessionTypes' => ['shell', 'meterpreter' ] )) diff --git a/modules/post/multi/gather/find_vmx.rb b/modules/post/multi/gather/find_vmx.rb index c25f619df0..82eaf62ec9 100644 --- a/modules/post/multi/gather/find_vmx.rb +++ b/modules/post/multi/gather/find_vmx.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => ['unix', 'bsd', 'linux', 'osx', 'win'], 'SessionTypes' => ['shell', 'meterpreter' ] )) diff --git a/modules/post/multi/gather/firefox_creds.rb b/modules/post/multi/gather/firefox_creds.rb index 2b8de7398d..62944537bb 100644 --- a/modules/post/multi/gather/firefox_creds.rb +++ b/modules/post/multi/gather/firefox_creds.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['bannedit'], - 'Version' => '$Revision$', 'Platform' => ['win', 'linux', 'bsd', 'unix', 'osx'], 'SessionTypes' => ['meterpreter', 'shell' ] )) diff --git a/modules/post/multi/gather/multi_command.rb b/modules/post/multi/gather/multi_command.rb index 104e2d2f15..6a171d4c28 100644 --- a/modules/post/multi/gather/multi_command.rb +++ b/modules/post/multi/gather/multi_command.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post execute the commands in the specified Meterpreter or shell session.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win', 'linux', 'bsd', 'unix', 'osx' ], 'SessionTypes' => [ 'meterpreter','shell' ] )) diff --git a/modules/post/multi/gather/pidgin_cred.rb b/modules/post/multi/gather/pidgin_cred.rb index ed7c3b81c6..d7b0b6d06c 100644 --- a/modules/post/multi/gather/pidgin_cred.rb +++ b/modules/post/multi/gather/pidgin_cred.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Post 'bannedit', # post port, added support for shell sessions 'Carlos Perez ' # original meterpreter script ], - 'Version' => '$Revision$', 'Platform' => ['unix', 'bsd', 'linux', 'osx', 'win'], 'SessionTypes' => ['shell', 'meterpreter' ] )) diff --git a/modules/post/multi/gather/ping_sweep.rb b/modules/post/multi/gather/ping_sweep.rb index 0319bedcfa..eac46c3698 100644 --- a/modules/post/multi/gather/ping_sweep.rb +++ b/modules/post/multi/gather/ping_sweep.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ Performs IPv4 ping sweep using the OS included ping command.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win','linux', 'osx', 'bsd', 'solaris' ], 'SessionTypes' => [ 'meterpreter', 'shell' ] )) diff --git a/modules/post/multi/gather/run_console_rc_file.rb b/modules/post/multi/gather/run_console_rc_file.rb index f3bb9d2179..ee5a21c389 100644 --- a/modules/post/multi/gather/run_console_rc_file.rb +++ b/modules/post/multi/gather/run_console_rc_file.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Post execute the commands in the specified Meterpreter session.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/multi/gather/skype_enum.rb b/modules/post/multi/gather/skype_enum.rb index 69fac10f7f..eaad0884e7 100644 --- a/modules/post/multi/gather/skype_enum.rb +++ b/modules/post/multi/gather/skype_enum.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win', 'osx' ], 'SessionTypes' => [ 'meterpreter', 'shell' ] )) diff --git a/modules/post/multi/gather/ssh_creds.rb b/modules/post/multi/gather/ssh_creds.rb index 8b76fb58f6..60638eece6 100644 --- a/modules/post/multi/gather/ssh_creds.rb +++ b/modules/post/multi/gather/ssh_creds.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['Jim Halfpenny'], - 'Version' => "$Revision$", 'Platform' => ['linux', 'bsd', 'unix', 'osx'], 'SessionTypes' => ['meterpreter', 'shell' ] )) diff --git a/modules/post/multi/general/close.rb b/modules/post/multi/general/close.rb index 21ac80101e..6a1b846e69 100644 --- a/modules/post/multi/general/close.rb +++ b/modules/post/multi/general/close.rb @@ -16,7 +16,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module closes the specified session. This can be useful as a finisher for automation tasks }, 'License' => MSF_LICENSE, 'Author' => [ 'hdm' ], - 'Version' => '$Revision$', 'Platform' => [ 'linux', 'win', 'unix', 'osx' ], 'SessionTypes' => [ 'shell', 'meterpreter' ] )) diff --git a/modules/post/multi/general/execute.rb b/modules/post/multi/general/execute.rb index 4d53afa4a1..6bf116701f 100644 --- a/modules/post/multi/general/execute.rb +++ b/modules/post/multi/general/execute.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module executes an arbitrary command line}, 'License' => MSF_LICENSE, 'Author' => [ 'hdm' ], - 'Version' => '$Revision$', 'Platform' => [ 'linux', 'win', 'unix', 'osx' ], 'SessionTypes' => [ 'shell', 'meterpreter' ] )) diff --git a/modules/post/multi/manage/multi_post.rb b/modules/post/multi/manage/multi_post.rb index 4190cdced1..a5324c8f53 100644 --- a/modules/post/multi/manage/multi_post.rb +++ b/modules/post/multi/manage/multi_post.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ ''], - 'Version' => '$Revision$', 'Platform' => [ 'win', 'unix', 'osx', 'linux', 'solaris' ], 'SessionTypes' => [ 'meterpreter','shell' ] )) diff --git a/modules/post/multi/manage/sudo.rb b/modules/post/multi/manage/sudo.rb index 69c94d3d85..e2e1273030 100644 --- a/modules/post/multi/manage/sudo.rb +++ b/modules/post/multi/manage/sudo.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'todb '], - 'Version' => '$Revision$', 'Platform' => [ 'linux','unix','osx','solaris','aix' ], 'References' => [ diff --git a/modules/post/multi/manage/system_session.rb b/modules/post/multi/manage/system_session.rb index 152517bed1..1724d1fa7f 100644 --- a/modules/post/multi/manage/system_session.rb +++ b/modules/post/multi/manage/system_session.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'unix', 'osx', 'linux'], 'SessionTypes' => [ 'meterpreter','shell' ] )) diff --git a/modules/post/osx/gather/enum_osx.rb b/modules/post/osx/gather/enum_osx.rb index 7455b3dd7b..9e7e897d29 100644 --- a/modules/post/osx/gather/enum_osx.rb +++ b/modules/post/osx/gather/enum_osx.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'osx' ], 'SessionTypes' => [ "shell" ] )) diff --git a/modules/post/osx/gather/hashdump.rb b/modules/post/osx/gather/hashdump.rb index d1f410ee59..bef4feac4c 100644 --- a/modules/post/osx/gather/hashdump.rb +++ b/modules/post/osx/gather/hashdump.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez ','hammackj '], - 'Version' => '$Revision$', 'Platform' => [ 'osx' ], 'SessionTypes' => [ "shell" ] )) diff --git a/modules/post/solaris/gather/checkvm.rb b/modules/post/solaris/gather/checkvm.rb index d4bfb904f1..68f63f4741 100644 --- a/modules/post/solaris/gather/checkvm.rb +++ b/modules/post/solaris/gather/checkvm.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Post and QEMU/KVM.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'solaris' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/solaris/gather/enum_packages.rb b/modules/post/solaris/gather/enum_packages.rb index a5690fbcd7..529f028ebb 100644 --- a/modules/post/solaris/gather/enum_packages.rb +++ b/modules/post/solaris/gather/enum_packages.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ Post Module to enumerate installed packages on a Solaris System}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'solaris' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/solaris/gather/enum_services.rb b/modules/post/solaris/gather/enum_services.rb index 44c866a3f4..d3bc5b41b2 100644 --- a/modules/post/solaris/gather/enum_services.rb +++ b/modules/post/solaris/gather/enum_services.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ Post Module to enumerate services on a Solaris System}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'solaris' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/solaris/gather/hashdump.rb b/modules/post/solaris/gather/hashdump.rb index ca410590a3..82be01d6ac 100644 --- a/modules/post/solaris/gather/hashdump.rb +++ b/modules/post/solaris/gather/hashdump.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ Post Module to dump the password hashes for all users on a Solaris System}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'solaris' ], 'SessionTypes' => [ 'shell' ] )) diff --git a/modules/post/windows/capture/keylog_recorder.rb b/modules/post/windows/capture/keylog_recorder.rb index b9b44b5358..b1f1b0857b 100644 --- a/modules/post/windows/capture/keylog_recorder.rb +++ b/modules/post/windows/capture/keylog_recorder.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter', ] diff --git a/modules/post/windows/capture/lockout_keylogger.rb b/modules/post/windows/capture/lockout_keylogger.rb index 094e3c0db8..ba091e24df 100644 --- a/modules/post/windows/capture/lockout_keylogger.rb +++ b/modules/post/windows/capture/lockout_keylogger.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post false sense of security to the user.}, 'License' => MSF_LICENSE, 'Author' => [ 'mubix', 'cg' ], - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'References' => [['URL', 'http://blog.metasploit.com/2010/12/capturing-windows-logons-with.html']] diff --git a/modules/post/windows/escalate/bypassuac.rb b/modules/post/windows/escalate/bypassuac.rb index b785b445e1..364b771a34 100644 --- a/modules/post/windows/escalate/bypassuac.rb +++ b/modules/post/windows/escalate/bypassuac.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'David Kennedy "ReL1K" ', 'mitnick' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'References' => [ diff --git a/modules/post/windows/escalate/getsystem.rb b/modules/post/windows/escalate/getsystem.rb index 11743256cb..3895b486b7 100644 --- a/modules/post/windows/escalate/getsystem.rb +++ b/modules/post/windows/escalate/getsystem.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => 'hdm', - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/escalate/ms10_073_kbdlayout.rb b/modules/post/windows/escalate/ms10_073_kbdlayout.rb index d4af0d9549..7a412a7208 100644 --- a/modules/post/windows/escalate/ms10_073_kbdlayout.rb +++ b/modules/post/windows/escalate/ms10_073_kbdlayout.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Post 'Ruben Santamarta', # First public exploit 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'References' => diff --git a/modules/post/windows/escalate/ms10_092_schelevator.rb b/modules/post/windows/escalate/ms10_092_schelevator.rb index 535c0827b9..e14fe3dfa6 100644 --- a/modules/post/windows/escalate/ms10_092_schelevator.rb +++ b/modules/post/windows/escalate/ms10_092_schelevator.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'References' => diff --git a/modules/post/windows/escalate/net_runtime_modify.rb b/modules/post/windows/escalate/net_runtime_modify.rb index 2e2845d3fd..1c54990055 100644 --- a/modules/post/windows/escalate/net_runtime_modify.rb +++ b/modules/post/windows/escalate/net_runtime_modify.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'bannedit' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'References' => diff --git a/modules/post/windows/escalate/screen_unlock.rb b/modules/post/windows/escalate/screen_unlock.rb index 450c721235..e991f2ea4f 100644 --- a/modules/post/windows/escalate/screen_unlock.rb +++ b/modules/post/windows/escalate/screen_unlock.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Post 'L4teral ', # Meterpreter script 'Metlstorm' # Based on the winlockpwn tool released by Metlstorm: http://www.storm.net.nz/projects/16 ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'References' => diff --git a/modules/post/windows/escalate/service_permissions.rb b/modules/post/windows/escalate/service_permissions.rb index b460c9eba3..b4dd4acf8f 100644 --- a/modules/post/windows/escalate/service_permissions.rb +++ b/modules/post/windows/escalate/service_permissions.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'scriptjunkie' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/arp_scanner.rb b/modules/post/windows/gather/arp_scanner.rb index dd1b10f264..58279920e6 100644 --- a/modules/post/windows/gather/arp_scanner.rb +++ b/modules/post/windows/gather/arp_scanner.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post Meterpreter Session.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter'] )) diff --git a/modules/post/windows/gather/bitcoin_jacker.rb b/modules/post/windows/gather/bitcoin_jacker.rb index 31192c248a..17fa022f55 100644 --- a/modules/post/windows/gather/bitcoin_jacker.rb +++ b/modules/post/windows/gather/bitcoin_jacker.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'illwill '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/cachedump.rb b/modules/post/windows/gather/cachedump.rb index df7d5a11b5..dddf43ab7e 100644 --- a/modules/post/windows/gather/cachedump.rb +++ b/modules/post/windows/gather/cachedump.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Post 'Maurizio Agazzini ', 'mubix' ], - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'References' => [['URL', 'http://lab.mediaservice.net/code/cachedump.rb']] diff --git a/modules/post/windows/gather/credentials/coreftp.rb b/modules/post/windows/gather/credentials/coreftp.rb index 34ff075d6e..ab3d649e36 100644 --- a/modules/post/windows/gather/credentials/coreftp.rb +++ b/modules/post/windows/gather/credentials/coreftp.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/credential_collector.rb b/modules/post/windows/gather/credentials/credential_collector.rb index 88714a9530..6797429c39 100644 --- a/modules/post/windows/gather/credentials/credential_collector.rb +++ b/modules/post/windows/gather/credentials/credential_collector.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module harvests credentials found on the host and stores them in the database.}, 'License' => MSF_LICENSE, 'Author' => [ 'tebo[at]attackresearch.com'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter'] )) diff --git a/modules/post/windows/gather/credentials/dyndns.rb b/modules/post/windows/gather/credentials/dyndns.rb index 0eb76ab4c5..c1af2d3684 100644 --- a/modules/post/windows/gather/credentials/dyndns.rb +++ b/modules/post/windows/gather/credentials/dyndns.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Post 'Shubham Dawra ', #SecurityXploded.com 'sinn3r', #Lots of code rewrite ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/enum_cred_store.rb b/modules/post/windows/gather/credentials/enum_cred_store.rb index 1573b934d3..338864138b 100644 --- a/modules/post/windows/gather/credentials/enum_cred_store.rb +++ b/modules/post/windows/gather/credentials/enum_cred_store.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post display the username and location. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Kx499'] diff --git a/modules/post/windows/gather/credentials/enum_picasa_pwds.rb b/modules/post/windows/gather/credentials/enum_picasa_pwds.rb index b46504c218..ff188cd141 100644 --- a/modules/post/windows/gather/credentials/enum_picasa_pwds.rb +++ b/modules/post/windows/gather/credentials/enum_picasa_pwds.rb @@ -30,7 +30,6 @@ class Metasploit3 < Msf::Post 'SecurityXploded Team', #www.SecurityXploded.com 'Sil3ntDre4m ', ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/epo_sql.rb b/modules/post/windows/gather/credentials/epo_sql.rb index 369dba5c8a..e192bac621 100644 --- a/modules/post/windows/gather/credentials/epo_sql.rb +++ b/modules/post/windows/gather/credentials/epo_sql.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['Nathan Einwechter '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/filezilla_server.rb b/modules/post/windows/gather/credentials/filezilla_server.rb index 9837b887d3..e3abcaeccf 100644 --- a/modules/post/windows/gather/credentials/filezilla_server.rb +++ b/modules/post/windows/gather/credentials/filezilla_server.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will collect credentials from the FileZilla FTP server if installed. }, 'License' => MSF_LICENSE, 'Author' => ['bannedit'], - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/flashfxp.rb b/modules/post/windows/gather/credentials/flashfxp.rb index aaadfe692e..452f3771ce 100644 --- a/modules/post/windows/gather/credentials/flashfxp.rb +++ b/modules/post/windows/gather/credentials/flashfxp.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post finds saved FTP connections in the Sites.dat file. }, 'License' => MSF_LICENSE, 'Author' => [ 'theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/ftpnavigator.rb b/modules/post/windows/gather/credentials/ftpnavigator.rb index e2d7c085d3..3f8927b1a8 100644 --- a/modules/post/windows/gather/credentials/ftpnavigator.rb +++ b/modules/post/windows/gather/credentials/ftpnavigator.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => "$Revision$", 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/idm.rb b/modules/post/windows/gather/credentials/idm.rb index 3d7bfbaf57..6398bf3420 100644 --- a/modules/post/windows/gather/credentials/idm.rb +++ b/modules/post/windows/gather/credentials/idm.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Post 'sil3ntdre4m ', 'SecurityXploded Team ' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/imail.rb b/modules/post/windows/gather/credentials/imail.rb index 0f3f700ce5..ec3b6b1aa2 100644 --- a/modules/post/windows/gather/credentials/imail.rb +++ b/modules/post/windows/gather/credentials/imail.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post particular category. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'sinn3r', #Metasploit diff --git a/modules/post/windows/gather/credentials/imvu.rb b/modules/post/windows/gather/credentials/imvu.rb index 21067309a1..745e30410b 100644 --- a/modules/post/windows/gather/credentials/imvu.rb +++ b/modules/post/windows/gather/credentials/imvu.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Post 'Shubham Dawra ' # www.SecurityXploded.com ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/meebo.rb b/modules/post/windows/gather/credentials/meebo.rb index 650d369983..bb5818b6b9 100644 --- a/modules/post/windows/gather/credentials/meebo.rb +++ b/modules/post/windows/gather/credentials/meebo.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post 'Sil3ntDre4m ', 'SecurityXploded Team ' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/mremote.rb b/modules/post/windows/gather/credentials/mremote.rb index d94e26d0c4..fbb7b19e8d 100644 --- a/modules/post/windows/gather/credentials/mremote.rb +++ b/modules/post/windows/gather/credentials/mremote.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Post 'hdm', #Helped write the Decryption Routine 'mubix' #Helped write the Decryption Routine ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/nimbuzz.rb b/modules/post/windows/gather/credentials/nimbuzz.rb index 7a1763a888..d2b084ee16 100644 --- a/modules/post/windows/gather/credentials/nimbuzz.rb +++ b/modules/post/windows/gather/credentials/nimbuzz.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post 'sil3ntdre4m ', 'SecurityXploded Team', #www.SecurityXploded.com ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/outlook.rb b/modules/post/windows/gather/credentials/outlook.rb index e1d0d29675..f9bf10b3e3 100644 --- a/modules/post/windows/gather/credentials/outlook.rb +++ b/modules/post/windows/gather/credentials/outlook.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Justin Cacak'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/smartftp.rb b/modules/post/windows/gather/credentials/smartftp.rb index 7737469e2b..238ba962ed 100644 --- a/modules/post/windows/gather/credentials/smartftp.rb +++ b/modules/post/windows/gather/credentials/smartftp.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, 'Name' => 'Windows Gather SmartFTP Saved Password Extraction', - 'Version' => '$Revision$', 'Description' => %q{ This module finds saved login credentials for the SmartFTP FTP client for windows. It finds the saved passwords and decrypts diff --git a/modules/post/windows/gather/credentials/total_commander.rb b/modules/post/windows/gather/credentials/total_commander.rb index 8de1442997..6620923307 100644 --- a/modules/post/windows/gather/credentials/total_commander.rb +++ b/modules/post/windows/gather/credentials/total_commander.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/trillian.rb b/modules/post/windows/gather/credentials/trillian.rb index 9f633ae88a..4a411168bd 100644 --- a/modules/post/windows/gather/credentials/trillian.rb +++ b/modules/post/windows/gather/credentials/trillian.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Post 'Sil3ntDre4m ', 'SecurityXploded Team', #www.SecurityXploded.com ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/vnc.rb b/modules/post/windows/gather/credentials/vnc.rb index fedc38ccf3..2cacaa380a 100644 --- a/modules/post/windows/gather/credentials/vnc.rb +++ b/modules/post/windows/gather/credentials/vnc.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Post 'Kurt Grutzmacher ', 'mubix' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/credentials/windows_autologin.rb b/modules/post/windows/gather/credentials/windows_autologin.rb index dea4dc8b45..0cc826870d 100644 --- a/modules/post/windows/gather/credentials/windows_autologin.rb +++ b/modules/post/windows/gather/credentials/windows_autologin.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Post [ 'Myo Soe ' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'References' => diff --git a/modules/post/windows/gather/credentials/winscp.rb b/modules/post/windows/gather/credentials/winscp.rb index ed0efc6da1..d63bb4f8b0 100644 --- a/modules/post/windows/gather/credentials/winscp.rb +++ b/modules/post/windows/gather/credentials/winscp.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post def initialize(info={}) super(update_info(info, 'Name' => 'Windows Gather WinSCP Saved Password Extraction', - 'Version' => '$Revision$', 'Description' => %q{ This module extracts weakly encrypted saved passwords from WinSCP. It searches for saved sessions in the Windows Registry diff --git a/modules/post/windows/gather/credentials/wsftp_client.rb b/modules/post/windows/gather/credentials/wsftp_client.rb index e7609e1379..6a1c5853bd 100644 --- a/modules/post/windows/gather/credentials/wsftp_client.rb +++ b/modules/post/windows/gather/credentials/wsftp_client.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/dumplinks.rb b/modules/post/windows/gather/dumplinks.rb index c63de3abbf..9de09578c2 100644 --- a/modules/post/windows/gather/dumplinks.rb +++ b/modules/post/windows/gather/dumplinks.rb @@ -29,7 +29,6 @@ class Metasploit3 < Msf::Post names, volume serial numbers, and more. }, 'License' => MSF_LICENSE, 'Author' => [ 'davehull '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_applications.rb b/modules/post/windows/gather/enum_applications.rb index 1dbff027a3..c78ecd18c9 100644 --- a/modules/post/windows/gather/enum_applications.rb +++ b/modules/post/windows/gather/enum_applications.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will enumerate all installed applications }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_chrome.rb b/modules/post/windows/gather/enum_chrome.rb index 42b45c12ac..69866a3f4e 100644 --- a/modules/post/windows/gather/enum_chrome.rb +++ b/modules/post/windows/gather/enum_chrome.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post sensitive information. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => diff --git a/modules/post/windows/gather/enum_devices.rb b/modules/post/windows/gather/enum_devices.rb index 1cac932524..eac863262e 100644 --- a/modules/post/windows/gather/enum_devices.rb +++ b/modules/post/windows/gather/enum_devices.rb @@ -24,7 +24,6 @@ class Metasploit3 < Msf::Post background job. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'Brandon Perry ' ], 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] diff --git a/modules/post/windows/gather/enum_dirperms.rb b/modules/post/windows/gather/enum_dirperms.rb index c523b6d618..bdbad7e5dd 100644 --- a/modules/post/windows/gather/enum_dirperms.rb +++ b/modules/post/windows/gather/enum_dirperms.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post %PATH% variable. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => diff --git a/modules/post/windows/gather/enum_domain.rb b/modules/post/windows/gather/enum_domain.rb index c3254064ee..0f73c4fb6f 100644 --- a/modules/post/windows/gather/enum_domain.rb +++ b/modules/post/windows/gather/enum_domain.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group Policy\\History\\DCName. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Joshua Abraham '] diff --git a/modules/post/windows/gather/enum_domain_group_users.rb b/modules/post/windows/gather/enum_domain_group_users.rb index 119fd7c28a..df6fe7333d 100644 --- a/modules/post/windows/gather/enum_domain_group_users.rb +++ b/modules/post/windows/gather/enum_domain_group_users.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Post 'Carlos Perez ', 'Stephen Haywood ' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_domain_tokens.rb b/modules/post/windows/gather/enum_domain_tokens.rb index c8f734a23b..d09a240ae6 100644 --- a/modules/post/windows/gather/enum_domain_tokens.rb +++ b/modules/post/windows/gather/enum_domain_tokens.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win'], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_hostfile.rb b/modules/post/windows/gather/enum_hostfile.rb index fc33fd2a67..8383c3df61 100644 --- a/modules/post/windows/gather/enum_hostfile.rb +++ b/modules/post/windows/gather/enum_hostfile.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Post }, 'License' => BSD_LICENSE, 'Author' => [ 'vt '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter', 'shell' ] )) diff --git a/modules/post/windows/gather/enum_logged_on_users.rb b/modules/post/windows/gather/enum_logged_on_users.rb index 10b48534df..f79a4fa054 100644 --- a/modules/post/windows/gather/enum_logged_on_users.rb +++ b/modules/post/windows/gather/enum_logged_on_users.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will enumerate current and recently logged on Windows users}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_ms_product_keys.rb b/modules/post/windows/gather/enum_ms_product_keys.rb index 8cd0ff45dc..d1c272a787 100644 --- a/modules/post/windows/gather/enum_ms_product_keys.rb +++ b/modules/post/windows/gather/enum_ms_product_keys.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will enumerate the OS license key }, 'License' => MSF_LICENSE, 'Author' => [ 'Brandon Perry '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_powershell_env.rb b/modules/post/windows/gather/enum_powershell_env.rb index d4dba2b539..78e0035280 100644 --- a/modules/post/windows/gather/enum_powershell_env.rb +++ b/modules/post/windows/gather/enum_powershell_env.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will enumerate Microsoft Powershell settings }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_proxy.rb b/modules/post/windows/gather/enum_proxy.rb index 833fbc30a0..723ffcc569 100644 --- a/modules/post/windows/gather/enum_proxy.rb +++ b/modules/post/windows/gather/enum_proxy.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Post def initialize super( 'Name' => 'Windows Gather Proxy Setting', - 'Version' => '$Revision$', 'Description' => %q{ This module pulls a user's proxy settings. If neither RHOST or SID are set it pulls the current user, else it will pull the user's settings diff --git a/modules/post/windows/gather/enum_services.rb b/modules/post/windows/gather/enum_services.rb index 023867f57d..6ee9f4aede 100644 --- a/modules/post/windows/gather/enum_services.rb +++ b/modules/post/windows/gather/enum_services.rb @@ -26,7 +26,6 @@ class Metasploit3 < Msf::Post migrate to a safe process (explorer.exe for example). }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Keith Faber', 'Kx499'] diff --git a/modules/post/windows/gather/enum_shares.rb b/modules/post/windows/gather/enum_shares.rb index 98393403a9..04522ba2e4 100644 --- a/modules/post/windows/gather/enum_shares.rb +++ b/modules/post/windows/gather/enum_shares.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will enumerate configured and recently used file shares}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_snmp.rb b/modules/post/windows/gather/enum_snmp.rb index 2531c24c8a..adce91bc6d 100644 --- a/modules/post/windows/gather/enum_snmp.rb +++ b/modules/post/windows/gather/enum_snmp.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will enumerate the SNMP service configuration }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez ', 'Tebo '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_termserv.rb b/modules/post/windows/gather/enum_termserv.rb index 8b8dc28fdb..1e9bdabb73 100644 --- a/modules/post/windows/gather/enum_termserv.rb +++ b/modules/post/windows/gather/enum_termserv.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'mubix' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/enum_tokens.rb b/modules/post/windows/gather/enum_tokens.rb index c4c153c3fc..ea9b850b65 100644 --- a/modules/post/windows/gather/enum_tokens.rb +++ b/modules/post/windows/gather/enum_tokens.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post privileges are available, the script will not continue. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Joshua Abraham '] diff --git a/modules/post/windows/gather/forensics/enum_drives.rb b/modules/post/windows/gather/forensics/enum_drives.rb index f3c68cfa12..fb7e1d8f5d 100644 --- a/modules/post/windows/gather/forensics/enum_drives.rb +++ b/modules/post/windows/gather/forensics/enum_drives.rb @@ -13,7 +13,6 @@ class Metasploit3 < Msf::Post 'Name' => 'Windows Gather Physical Drives and Logical Volumes', 'Description' => %q{This module will list physical drives and logical volumes}, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Wesley McGrew '] diff --git a/modules/post/windows/gather/forensics/imager.rb b/modules/post/windows/gather/forensics/imager.rb index 4ecdea8181..df2c8f769a 100644 --- a/modules/post/windows/gather/forensics/imager.rb +++ b/modules/post/windows/gather/forensics/imager.rb @@ -16,7 +16,6 @@ class Metasploit3 < Msf::Post 'Name' => 'Windows Gather Forensic Imaging', 'Description' => %q{This module will perform byte-for-byte imaging of remote disks and volumes}, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Wesley McGrew '] diff --git a/modules/post/windows/gather/forensics/nbd_server.rb b/modules/post/windows/gather/forensics/nbd_server.rb index f44821a10d..4e85c89abe 100644 --- a/modules/post/windows/gather/forensics/nbd_server.rb +++ b/modules/post/windows/gather/forensics/nbd_server.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Post Allows for forensic tools to be executed on the remote disk directly. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Wesley McGrew '] diff --git a/modules/post/windows/gather/hashdump.rb b/modules/post/windows/gather/hashdump.rb index 4706791c19..83c2f566eb 100644 --- a/modules/post/windows/gather/hashdump.rb +++ b/modules/post/windows/gather/hashdump.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will dump the local user accounts from the SAM database using the registry }, 'License' => MSF_LICENSE, 'Author' => [ 'hdm' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/memory_grep.rb b/modules/post/windows/gather/memory_grep.rb index ad36c817e6..845c7e6451 100644 --- a/modules/post/windows/gather/memory_grep.rb +++ b/modules/post/windows/gather/memory_grep.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['bannedit'], - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter' ] )) diff --git a/modules/post/windows/gather/resolve_sid.rb b/modules/post/windows/gather/resolve_sid.rb index 0bee51963f..97772d2e71 100644 --- a/modules/post/windows/gather/resolve_sid.rb +++ b/modules/post/windows/gather/resolve_sid.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module prints information about a given SID from the perspective of this session }, 'License' => MSF_LICENSE, 'Author' => [ 'chao-mu'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/reverse_lookup.rb b/modules/post/windows/gather/reverse_lookup.rb index c525f2e564..42ab10ca20 100644 --- a/modules/post/windows/gather/reverse_lookup.rb +++ b/modules/post/windows/gather/reverse_lookup.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Post to an IP. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => [ 'mubix' ] diff --git a/modules/post/windows/gather/screen_spy.rb b/modules/post/windows/gather/screen_spy.rb index 86bb6deb69..7b53d9391f 100644 --- a/modules/post/windows/gather/screen_spy.rb +++ b/modules/post/windows/gather/screen_spy.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post 'kernelsmith ', # record support 'Adrian Kubok' # better record file names ], - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'] )) diff --git a/modules/post/windows/gather/smart_hashdump.rb b/modules/post/windows/gather/smart_hashdump.rb index 85f57dd421..5276d988af 100644 --- a/modules/post/windows/gather/smart_hashdump.rb +++ b/modules/post/windows/gather/smart_hashdump.rb @@ -33,7 +33,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/tcpnetstat.rb b/modules/post/windows/gather/tcpnetstat.rb index 4e6156329f..20b11fcee9 100644 --- a/modules/post/windows/gather/tcpnetstat.rb +++ b/modules/post/windows/gather/tcpnetstat.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This Module lists current TCP sessions}, 'License' => MSF_LICENSE, 'Author' => [ 'mubix' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter'] )) diff --git a/modules/post/windows/gather/usb_history.rb b/modules/post/windows/gather/usb_history.rb index 22239b5995..a7e049260a 100644 --- a/modules/post/windows/gather/usb_history.rb +++ b/modules/post/windows/gather/usb_history.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module will enumerate USB Drive history on a target host.}, 'License' => MSF_LICENSE, 'Author' => [ 'nebulus'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/gather/wmic_command.rb b/modules/post/windows/gather/wmic_command.rb index bf402df57f..1734683a22 100644 --- a/modules/post/windows/gather/wmic_command.rb +++ b/modules/post/windows/gather/wmic_command.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post specified Meterpreter session.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/add_user_domain.rb b/modules/post/windows/manage/add_user_domain.rb index a57872204b..3cf05cb50c 100644 --- a/modules/post/windows/manage/add_user_domain.rb +++ b/modules/post/windows/manage/add_user_domain.rb @@ -28,7 +28,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => 'Joshua Abraham ', - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/autoroute.rb b/modules/post/windows/manage/autoroute.rb index 486516523f..2ecb936778 100644 --- a/modules/post/windows/manage/autoroute.rb +++ b/modules/post/windows/manage/autoroute.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post compromised host when connecting to the named NETWORK and SUBMASK.}, 'License' => MSF_LICENSE, 'Author' => [ 'todb'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter'] )) diff --git a/modules/post/windows/manage/clone_proxy_settings.rb b/modules/post/windows/manage/clone_proxy_settings.rb index d5ded5c06d..3b96b4a4be 100644 --- a/modules/post/windows/manage/clone_proxy_settings.rb +++ b/modules/post/windows/manage/clone_proxy_settings.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Post def initialize super( 'Name' => 'Windows Manage Proxy Setting Cloner', - 'Version' => '$Revision$', 'Description' => %q{ This module copies the proxy settings from the current user to the targeted user SID, supports remote hosts as well if remote registry diff --git a/modules/post/windows/manage/delete_user.rb b/modules/post/windows/manage/delete_user.rb index 03c11de89a..e3095c4dac 100644 --- a/modules/post/windows/manage/delete_user.rb +++ b/modules/post/windows/manage/delete_user.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'chao-mu'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/enable_rdp.rb b/modules/post/windows/manage/enable_rdp.rb index 05ff3978b3..f8883c54f9 100644 --- a/modules/post/windows/manage/enable_rdp.rb +++ b/modules/post/windows/manage/enable_rdp.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Post Remote Desktop Users group. It can also forward the target's port 3389/tcp.}, 'License' => BSD_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/inject_ca.rb b/modules/post/windows/manage/inject_ca.rb index 726fab8d87..e145a1b2ec 100644 --- a/modules/post/windows/manage/inject_ca.rb +++ b/modules/post/windows/manage/inject_ca.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Post }, 'License' => BSD_LICENSE, 'Author' => [ 'vt '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/inject_host.rb b/modules/post/windows/manage/inject_host.rb index ec24e9cf38..9ed36b35d4 100644 --- a/modules/post/windows/manage/inject_host.rb +++ b/modules/post/windows/manage/inject_host.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Post }, 'License' => BSD_LICENSE, 'Author' => [ 'vt '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/migrate.rb b/modules/post/windows/manage/migrate.rb index 27db9259ca..02849fcfde 100644 --- a/modules/post/windows/manage/migrate.rb +++ b/modules/post/windows/manage/migrate.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Post migrate to that newly spawned process.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/multi_meterpreter_inject.rb b/modules/post/windows/manage/multi_meterpreter_inject.rb index 7e3888d84a..881c791c67 100644 --- a/modules/post/windows/manage/multi_meterpreter_inject.rb +++ b/modules/post/windows/manage/multi_meterpreter_inject.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Post payload in to the memory of the created module.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter'] )) diff --git a/modules/post/windows/manage/nbd_server.rb b/modules/post/windows/manage/nbd_server.rb index 1887a5d3e5..a41765f305 100644 --- a/modules/post/windows/manage/nbd_server.rb +++ b/modules/post/windows/manage/nbd_server.rb @@ -16,7 +16,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{Maps remote disks and logical volumes to a local Network Block Device server. Allows for forensic tools to be executed on the remote disk directly.}, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Wesley McGrew '] diff --git a/modules/post/windows/manage/payload_inject.rb b/modules/post/windows/manage/payload_inject.rb index 96383d6c24..40b5e33190 100644 --- a/modules/post/windows/manage/payload_inject.rb +++ b/modules/post/windows/manage/payload_inject.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/persistence.rb b/modules/post/windows/manage/persistence.rb index f566ed060f..12d2805069 100644 --- a/modules/post/windows/manage/persistence.rb +++ b/modules/post/windows/manage/persistence.rb @@ -39,7 +39,6 @@ class Metasploit3 < Msf::Post 'Carlos Perez ', 'Merlyn drforbin Cousins ' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'Actions' => [['TEMPLATE'], ['REXE']], 'DefaultAction' => 'TEMPLATE', diff --git a/modules/post/windows/manage/powershell/exec_powershell.rb b/modules/post/windows/manage/powershell/exec_powershell.rb index 0ffd0eed80..59bc7cccff 100644 --- a/modules/post/windows/manage/powershell/exec_powershell.rb +++ b/modules/post/windows/manage/powershell/exec_powershell.rb @@ -32,7 +32,6 @@ class Metasploit3 < Msf::Post Setting VERBOSE to true will output both the script prior to execution and the results. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => [ diff --git a/modules/post/windows/manage/pxexploit.rb b/modules/post/windows/manage/pxexploit.rb index 1020d93762..599e6679a8 100644 --- a/modules/post/windows/manage/pxexploit.rb +++ b/modules/post/windows/manage/pxexploit.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Post def initialize super( 'Name' => 'Windows Manage PXE Exploit Server', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a PXE server, running a DHCP and TFTP server. The default configuration loads a linux kernel and initrd into memory that diff --git a/modules/post/windows/manage/remove_ca.rb b/modules/post/windows/manage/remove_ca.rb index 858dd43151..32d5b31c52 100644 --- a/modules/post/windows/manage/remove_ca.rb +++ b/modules/post/windows/manage/remove_ca.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Post from the victim's Trusted Root store.}, 'License' => BSD_LICENSE, 'Author' => [ 'vt '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/remove_host.rb b/modules/post/windows/manage/remove_host.rb index a88e2dd71f..bf26774efd 100644 --- a/modules/post/windows/manage/remove_host.rb +++ b/modules/post/windows/manage/remove_host.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Post }, 'License' => BSD_LICENSE, 'Author' => [ 'vt '], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/manage/run_as.rb b/modules/post/windows/manage/run_as.rb index c1654219c6..9a6c749155 100644 --- a/modules/post/windows/manage/run_as.rb +++ b/modules/post/windows/manage/run_as.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post password and then execute the command. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'], 'Author' => ['Kx499'] diff --git a/modules/post/windows/manage/smart_migrate.rb b/modules/post/windows/manage/smart_migrate.rb index ce00bb5dd5..b40bd5d425 100644 --- a/modules/post/windows/manage/smart_migrate.rb +++ b/modules/post/windows/manage/smart_migrate.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post and try any other explorer.exe processes it finds}, 'License' => MSF_LICENSE, 'Author' => [ 'thelightcosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/recon/computer_browser_discovery.rb b/modules/post/windows/recon/computer_browser_discovery.rb index 42eeecb43b..f1975089d2 100644 --- a/modules/post/windows/recon/computer_browser_discovery.rb +++ b/modules/post/windows/recon/computer_browser_discovery.rb @@ -25,7 +25,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => [ 'mubix' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/recon/resolve_ip.rb b/modules/post/windows/recon/resolve_ip.rb index af675e172d..f4e761de39 100644 --- a/modules/post/windows/recon/resolve_ip.rb +++ b/modules/post/windows/recon/resolve_ip.rb @@ -20,7 +20,6 @@ class Metasploit3 < Msf::Post 'Description' => %q{ This module reverse resolves a range or IP to a hostname}, 'License' => MSF_LICENSE, 'Author' => [ 'mubix' ], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/wlan/wlan_bss_list.rb b/modules/post/windows/wlan/wlan_bss_list.rb index 916ab500f5..5cb83e4b24 100644 --- a/modules/post/windows/wlan/wlan_bss_list.rb +++ b/modules/post/windows/wlan/wlan_bss_list.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/wlan/wlan_current_connection.rb b/modules/post/windows/wlan/wlan_current_connection.rb index 1263417e22..870104b64f 100644 --- a/modules/post/windows/wlan/wlan_current_connection.rb +++ b/modules/post/windows/wlan/wlan_current_connection.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/wlan/wlan_disconnect.rb b/modules/post/windows/wlan/wlan_disconnect.rb index 73fcf6ae72..7037787c18 100644 --- a/modules/post/windows/wlan/wlan_disconnect.rb +++ b/modules/post/windows/wlan/wlan_disconnect.rb @@ -21,7 +21,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) diff --git a/modules/post/windows/wlan/wlan_profile.rb b/modules/post/windows/wlan/wlan_profile.rb index 2c47a7bf78..8ec2c9ff44 100644 --- a/modules/post/windows/wlan/wlan_profile.rb +++ b/modules/post/windows/wlan/wlan_profile.rb @@ -23,7 +23,6 @@ class Metasploit3 < Msf::Post }, 'License' => MSF_LICENSE, 'Author' => ['theLightCosine'], - 'Version' => '$Revision$', 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] ))