parent
6d5bcb93a8
commit
4bbec88882
|
@ -18,7 +18,9 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
buffer overflow in the GNU C Library's gethostbyname functions on x86
|
||||
and x86_64 GNU/Linux systems that run the Exim mail server.
|
||||
},
|
||||
'Author' => ['Qualys, Inc. <qsa[at]qualys.com>'],
|
||||
'Author' => [
|
||||
'Unknown', # Discovered and published by Qualys, Inc.
|
||||
],
|
||||
'License' => BSD_LICENSE,
|
||||
'References' => [
|
||||
['CVE', '2015-0235'],
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Nine:Situations:Group::pyrokinesis',
|
||||
'pyrokinesis', # Of Nine:Situations:Group
|
||||
'jduck'
|
||||
],
|
||||
'References' =>
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Plone Security team', # Vulnerability discovery
|
||||
'Unknown', # Plone Security Team, original vulnerability discovery
|
||||
'Nick Miles', # Original exploit
|
||||
'TecR0c <roccogiovannicalvi[at]gmail.com>' # Metasploit module
|
||||
],
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Nine:Situations:Group::SnoopyAssault', # Vulnerability discovery and exploit
|
||||
'Unknown', # Nine:Situations:Group::SnoopyAssault, vulnerability discovery and exploit
|
||||
'juan vazquez' # metasploit module
|
||||
],
|
||||
'References' =>
|
||||
|
|
|
@ -23,10 +23,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Dark Son ', # Vulnerability discovery
|
||||
'Qihoo 360 Security Center', # Vulnerability discovery
|
||||
'Dark Son', # Vulnerability discovery
|
||||
'Unknown', # Credited to both Qihoo 360 Security Center and Google, Inc. for Vulnerability discovery
|
||||
'Yichong Lin', # Vulnerability discovery
|
||||
'Google Inc.', # Vulnerability discovery
|
||||
'juan vazquez' # Metasploit module
|
||||
],
|
||||
'References' =>
|
||||
|
|
|
@ -18,7 +18,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
overlong DSC Comment Buffer Overflow Exploit
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Nine:Situations:Group::pyrokinesis', 'dookie' ],
|
||||
'Author' => [
|
||||
'pyrokinesis', # Of Nine:Situations:Group
|
||||
'dookie'
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-4195' ],
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'CORE Security', # original discovery
|
||||
'Unknown', # CORE Security, original discovery
|
||||
'Shahin Ramezany <shahin[at]abysssec.com>', # MOAUB #8 exploit and binary analysis
|
||||
'juan vazquez', # metasploit module
|
||||
],
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'CORELAN Security Team ',
|
||||
'Unknown', # CORELAN Security Team
|
||||
'Ron Henry <rlh[at]ciphermonk.net>', # dijital1; Return address update
|
||||
],
|
||||
'References' =>
|
||||
|
|
Loading…
Reference in New Issue