metasploit_data_models 0.22.4-java → 0.22.5-java

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 39771dc4270800fd4aff90a4e932a2e1045add0d
4
- data.tar.gz: 3cf37a1d942b1e9c87322b9df4984b3a99c1c355
3
+ metadata.gz: 7ff15912b8fc39083358dd2a6aab411191698b79
4
+ data.tar.gz: 40d77970a8e3f1e381b75fc385d4cc15b452954c
5
5
  SHA512:
6
- metadata.gz: f42f3042b7bab0a3820682ccea664bf92b3eb9e8a2c58deebf124db8c089328d0a345fef8da810e5e467ab644e5606568bebe3be3d20e37e777e81a3034df6bc
7
- data.tar.gz: 932c332a119c09be25f64e54306cfeecba155b243a8d630be499605caaa6170f7cd0a45d2b0a7395a4c66878bd50685cdc7b3d39ec8cef1ecbbd1530cbdca190
6
+ metadata.gz: 3051a8c3076849191e6736267a60bdf4205cf4a2c64d3b8e8b1b503be83f029b0712a8c6bbd4cb8f37684fbb62d76e2b9f741277a6157865df3040a68611c978
7
+ data.tar.gz: 99c68e9218400d5ae470dc13fd8f0b91a38488bc0457bfea915911e93144d9a80bf513c74cbc1a9146554afa6890e90d4e01aa7635aac69d72107f74edb794ad
@@ -4,7 +4,7 @@ class MigrateCredData < ActiveRecord::Migration
4
4
  begin # Wrap the whole thing in a giant rescue.
5
5
  skipped_notes = []
6
6
  new_creds = []
7
- Mdm::Note.find(:all).each do |note|
7
+ Mdm::Note.all.each do |note|
8
8
  next unless note.ntype[/^auth\.(.*)/]
9
9
  service_name = $1
10
10
  if !service_name
@@ -135,7 +135,7 @@ class MigrateCredData < ActiveRecord::Migration
135
135
  end
136
136
 
137
137
  say "Deleting migrated auth notes."
138
- Mdm::Note.find(:all).each do |note|
138
+ Mdm::Note.all.each do |note|
139
139
  next unless note.ntype[/^auth\.(.*)/]
140
140
  note.delete
141
141
  end
@@ -27,10 +27,10 @@ class ConvertBinary < ActiveRecord::Migration
27
27
  add_column :web_vulns, :request, :binary
28
28
  add_column :web_vulns, :proof, :binary
29
29
 
30
- WebPage.find(:all).each { |r| r.body = r.body_text; r.save! }
31
- WebPage.find(:all).each { |r| r.request = r.request_text; r.save! }
32
- WebVuln.find(:all).each { |r| r.proof = r.proof_text; r.save! }
33
- WebVuln.find(:all).each { |r| r.request = r.request_text; r.save! }
30
+ WebPage.all.each { |r| r.body = r.body_text; r.save! }
31
+ WebPage.all.each { |r| r.request = r.request_text; r.save! }
32
+ WebVuln.all.each { |r| r.proof = r.proof_text; r.save! }
33
+ WebVuln.all.each { |r| r.request = r.request_text; r.save! }
34
34
 
35
35
  remove_column :web_pages, :body_text
36
36
  remove_column :web_pages, :request_text
@@ -55,10 +55,10 @@ class ConvertBinary < ActiveRecord::Migration
55
55
  add_column :web_vulns, :request, :text
56
56
  add_column :web_vulns, :proof, :text
57
57
 
58
- WebPage.find(:all).each { |r| r.body = bfilter(r.body_binary); r.save! }
59
- WebPage.find(:all).each { |r| r.request = bfilter(r.request_binary); r.save! }
60
- WebVuln.find(:all).each { |r| r.proof = bfilter(r.proof_binary); r.save! }
61
- WebVuln.find(:all).each { |r| r.request = bfilter(r.request_binary); r.save! }
58
+ WebPage.all.each { |r| r.body = bfilter(r.body_binary); r.save! }
59
+ WebPage.all.each { |r| r.request = bfilter(r.request_binary); r.save! }
60
+ WebVuln.all.each { |r| r.proof = bfilter(r.proof_binary); r.save! }
61
+ WebVuln.all.each { |r| r.request = bfilter(r.request_binary); r.save! }
62
62
 
63
63
  remove_column :web_pages, :body_binary
64
64
  remove_column :web_pages, :request_binary
@@ -12,7 +12,7 @@ class TrackSuccessfulExploits < ActiveRecord::Migration
12
12
 
13
13
  # Migrate existing exploited_hosts entries
14
14
 
15
- ExploitedHost.find(:all).select {|x| x.name}.each do |exploited_host|
15
+ ExploitedHost.all.select {|x| x.name}.each do |exploited_host|
16
16
  next unless(exploited_host.name =~ /^(exploit|auxiliary)\//)
17
17
  vulns = Vuln.where(name: exploited_host.name, host_id: exploited_host.host_id)
18
18
  next if vulns.empty?
@@ -6,7 +6,7 @@ class RenameAndPruneNessusVulns < ActiveRecord::Migration
6
6
  # No table changes, just vuln renaming to drop the NSS id
7
7
  # from those vulns that have it and a descriptive name.
8
8
  def self.up
9
- Vuln.find(:all).each do |v|
9
+ Vuln.all.each do |v|
10
10
  if v.name =~ /^NSS-0?\s*$/
11
11
  v.delete
12
12
  next
@@ -9,7 +9,7 @@ class AddDisplayNameToReportsTable < ActiveRecord::Migration
9
9
 
10
10
  # Migrate to have a default name.
11
11
 
12
- Report.find(:all).each do |report|
12
+ Report.all.each do |report|
13
13
  rtype = report.rtype.to_s =~ /^([A-Z0-9]+)\x2d/i ? $1 : "AUDIT"
14
14
  default_name = rtype[0,57].downcase.capitalize + "-" + report.id.to_s[0,5]
15
15
  report.name = default_name
@@ -6,7 +6,7 @@ module MetasploitDataModels
6
6
  # The minor version number, scoped to the {MAJOR} version number.
7
7
  MINOR = 22
8
8
  # The patch number, scoped to the {MINOR} version number.
9
- PATCH = 4
9
+ PATCH = 5
10
10
 
11
11
  # The full version string, including the {MAJOR}, {MINOR}, {PATCH}, and optionally, the `PRERELEASE` in the
12
12
  # {http://semver.org/spec/v2.0.0.html semantic versioning v2.0.0} format.
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit_data_models
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.22.4
4
+ version: 0.22.5
5
5
  platform: java
6
6
  authors:
7
7
  - Samuel Huckins