Various other one-off nonhuman author credits

[See #5012]
bug/bundler_fix
Tod Beardsley 2015-04-02 15:25:47 -05:00
parent 6d5bcb93a8
commit 4bbec88882
No known key found for this signature in database
GPG Key ID: BD63D0A3EA19CAAC
8 changed files with 14 additions and 10 deletions

View File

@ -18,7 +18,9 @@ class Metasploit4 < Msf::Exploit::Remote
buffer overflow in the GNU C Library's gethostbyname functions on x86
and x86_64 GNU/Linux systems that run the Exim mail server.
},
'Author' => ['Qualys, Inc. <qsa[at]qualys.com>'],
'Author' => [
'Unknown', # Discovered and published by Qualys, Inc.
],
'License' => BSD_LICENSE,
'References' => [
['CVE', '2015-0235'],

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Nine:Situations:Group::pyrokinesis',
'pyrokinesis', # Of Nine:Situations:Group
'jduck'
],
'References' =>

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Plone Security team', # Vulnerability discovery
'Unknown', # Plone Security Team, original vulnerability discovery
'Nick Miles', # Original exploit
'TecR0c <roccogiovannicalvi[at]gmail.com>' # Metasploit module
],

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Nine:Situations:Group::SnoopyAssault', # Vulnerability discovery and exploit
'Unknown', # Nine:Situations:Group::SnoopyAssault, vulnerability discovery and exploit
'juan vazquez' # metasploit module
],
'References' =>

View File

@ -23,10 +23,9 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Dark Son ', # Vulnerability discovery
'Qihoo 360 Security Center', # Vulnerability discovery
'Dark Son', # Vulnerability discovery
'Unknown', # Credited to both Qihoo 360 Security Center and Google, Inc. for Vulnerability discovery
'Yichong Lin', # Vulnerability discovery
'Google Inc.', # Vulnerability discovery
'juan vazquez' # Metasploit module
],
'References' =>

View File

@ -18,7 +18,10 @@ class Metasploit3 < Msf::Exploit::Remote
overlong DSC Comment Buffer Overflow Exploit
},
'License' => MSF_LICENSE,
'Author' => [ 'Nine:Situations:Group::pyrokinesis', 'dookie' ],
'Author' => [
'pyrokinesis', # Of Nine:Situations:Group
'dookie'
],
'References' =>
[
[ 'CVE', '2009-4195' ],

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'CORE Security', # original discovery
'Unknown', # CORE Security, original discovery
'Shahin Ramezany <shahin[at]abysssec.com>', # MOAUB #8 exploit and binary analysis
'juan vazquez', # metasploit module
],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'CORELAN Security Team ',
'Unknown', # CORELAN Security Team
'Ron Henry <rlh[at]ciphermonk.net>', # dijital1; Return address update
],
'References' =>