From 405eae4b6e93b3cda310078b4a42e8f4d1b0669e Mon Sep 17 00:00:00 2001 From: William Vu Date: Mon, 17 Nov 2014 11:46:36 -0600 Subject: [PATCH] Remove EOL whitespace --- modules/auxiliary/server/browser_autopwn.rb | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/modules/auxiliary/server/browser_autopwn.rb b/modules/auxiliary/server/browser_autopwn.rb index 8f19a9a0c2..8df9a3f552 100644 --- a/modules/auxiliary/server/browser_autopwn.rb +++ b/modules/auxiliary/server/browser_autopwn.rb @@ -851,7 +851,7 @@ class Metasploit3 < Msf::Auxiliary return !! client_str.match(module_spec) when ::Array return !! exploit_spec.map{ |spec| - client_matches_module_spec?(client_str, spec) + client_matches_module_spec?(client_str, spec) }.include?(true) end @@ -935,7 +935,6 @@ class Metasploit3 < Msf::Auxiliary detected_version = Rex::Text.decode_base64(Rex::Text.uri_decode(detected_version)) print_status("JavaScript Report: #{detected_version}") - (os_name, os_vendor, os_flavor, os_device, os_sp, os_lang, arch, ua_name, ua_ver) = detected_version.split(':') if framework.db.active @@ -947,7 +946,7 @@ class Metasploit3 < Msf::Auxiliary note_data['os.version'] = os_sp if os_sp != 'undefined' note_data['os.language'] = os_lang if os_lang != 'undefined' note_data['os.arch'] = arch if arch != 'undefined' - note_data['os.certainty'] = '0.7' + note_data['os.certainty'] = '0.7' print_status("Reporting: #{note_data.inspect}") # Reporting stuff isn't really essential since we store all