Updated svn:keywords

git-svn-id: file:///home/svn/framework3/trunk@5100 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2007-09-10 01:01:20 +00:00
parent eabc0b511d
commit 04c6dbc748
18 changed files with 26 additions and 26 deletions

View File

@ -1,5 +1,5 @@
##
# $Id: mozilla_navigatorjava.rb 4646 2007-04-04 04:37:30Z hdm $
# $Id$
##
##
@ -36,7 +36,7 @@ class Exploits::Multi::Browser::QTJavaPointer < Msf::Exploit::Remote
'Kevin Finisterre <kf[at]digitalmunition.com>', # Added support for Mac OS X X86
'Dino Dai Zovi <ddz[at]theta44.org> ' # Discovered bug, provided tips
],
'Version' => '$Revision: 4646 $',
'Version' => '$Revision$',
'References' =>
[
['BID', '23608'],

View File

@ -1,5 +1,5 @@
##
# $Id: trendmicro_serverprotect_createbinding.rb 4886 2007-05-07 04:48:45Z hdm $
# $Id$
##
##
@ -28,7 +28,7 @@ class Exploits::Windows::Antivirus::Trendmicro_Serverprotect_Createbinding < Msf
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 4886 $',
'Version' => '$Revision$',
'References' =>
[
['BID', '23868'],

View File

@ -1,5 +1,5 @@
##
# $Id: trendmicro_serverprotect_earthagent.rb 4886 2007-05-07 04:48:45Z hdm $
# $Id$
##
##
@ -28,7 +28,7 @@ class Exploits::Windows::Antivirus::Trendmicro_Serverprotect_EarthAgent < Msf::E
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 4886 $',
'Version' => '$Revision$',
'References' =>
[
['BID', '23866'],

View File

@ -1,5 +1,5 @@
##
# $Id: enjoysapgui_preparetoposthtml.rb 4886 2007-05-07 04:48:45Z hdm $
# $Id$
##
##
@ -28,7 +28,7 @@ class Exploits::Windows::Browser::Enjoysapgui_preparetoposthtml< Msf::Exploit::R
},
'License' => MSF_LICENSE,
'Author' => [ 'MC' ],
'Version' => '$Revision: 4886 $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-3605' ],

View File

@ -1,5 +1,5 @@
##
# $Id: logitechvideocall_start.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: mcafeevisualtrace_tracetarget.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: trendmicro_officescan.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: yahoomessenger_server.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -15,7 +15,7 @@ class Exploits::Windows::Ftp::Filecopa_List_Overflow < Msf::Exploit::Remote
},
'Author' => [ 'Jacopo Cervini' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 3714 $',
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '19065' ],

View File

@ -27,7 +27,7 @@ class Exploits::Windows::Ftp::LeapFTP_PASV_Reply < Exploit::Remote
},
'Author' => 'Patrick Webster <patrick@aushack.com>',
'License' => MSF_LICENSE,
'Version' => '$Revision: 4460 $',
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'http://www.milw0rm.com/exploits/54' ],

View File

@ -27,7 +27,7 @@ class Exploits::Windows::Http::PSOProxy91_Overflow < Exploit::Remote
},
'Author' => 'Patrick Webster <patrick@aushack.com>',
'License' => MSF_LICENSE,
'Version' => '$Revision: 4460 $',
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'http://www.milw0rm.com/exploits/156' ],

View File

@ -1,5 +1,5 @@
##
# $Id: sapdb_webtools.rb 4498 2007-03-01 08:21:36Z mmiller $
# $Id$
##
##
@ -31,7 +31,7 @@ class Exploits::Windows::Http::SapDB_Webtools < Msf::Exploit::Remote
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 4498 $',
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '24773' ],

View File

@ -17,7 +17,7 @@ class Exploits::Windows::Http::TrendMicro_OfficeScan_Overflow < Msf::Exploit::Re
},
'Author' => [ 'toto' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 3636 $',
'Version' => '$Revision$',
'References' =>
[
],

View File

@ -1,5 +1,5 @@
##
# $Id: ipswitch_search.rb 4419 2007-02-18 00:10:39Z hdm $
# $Id$
##
##
@ -30,7 +30,7 @@ class Exploits::Windows::Imap::Ipswitch_Search < Msf::Exploit::Remote
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 4419 $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-3926' ],

View File

@ -1,5 +1,5 @@
##
# $Id: borland_interbase.rb 4886 2007-05-07 04:48:45Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: hp_ovtrace.rb 4886 2007-05-07 04:48:45Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: windows_rsh.rb 4886 2007-05-07 04:48:45Z hdm $
# $Id$
##
##
@ -29,7 +29,7 @@ class Exploits::Windows::Misc::Windows_Rsh < Msf::Exploit::Remote
},
'Author' => 'MC',
'License' => MSF_LICENSE,
'Version' => '$Revision: 1.0 $',
'Version' => '$Revision$',
'References' =>
[
['BID', '25044'],

View File

@ -1,4 +1,4 @@
# $Id: shell_reverse_tcp.rb 4984 2007-06-09 02:25:31Z hdm $
# $Id$
##
##
@ -33,7 +33,7 @@ module ShellReverseTcp2
# and: puts shellcode.decode
super(merge_info(info,
'Name' => 'Linux Command Shell, Reverse TCP Inline - Metasm demo',
'Version' => '$Revision: 4984 $',
'Version' => '$Revision$',
'Description' => 'Connect back to attacker and spawn a command shell',
'Author' => 'skape + Yoann Guillot and Julien Tinnes for metasm PoC',
'License' => MSF_LICENSE,