Other licensing updates (MSF->BSD) and minor cleanups

git-svn-id: file:///home/svn/incoming/trunk@3637 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2006-05-06 16:43:45 +00:00
parent d086a1bedf
commit 615104b6ab
8 changed files with 9 additions and 24 deletions

View File

@ -20,10 +20,7 @@ class Exploits::Multi::Browser::Firefox_QueryInterface < Msf::Exploit::Remote
},
'License' => MSF_LICENSE,
'Author' =>
[
'hdm',
],
'Author' => ['hdm'],
'Version' => '$Revision$',
'References' =>
[
@ -66,15 +63,7 @@ class Exploits::Multi::Browser::Firefox_QueryInterface < Msf::Exploit::Remote
return if ((p = regenerate_payload(cli)) == nil)
print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")
begin
# Transmit the response to the client
send_response(cli, generate_html(p), { 'Content-Type' => 'text/html' })
rescue ::Exception => e
$stderr.puts "Exception: #{e.to_s}"
$stderr.puts e.backtrace.join("\n")+"\n"
end
send_response(cli, generate_html(p), { 'Content-Type' => 'text/html' })
handler(cli)
end

View File

@ -20,10 +20,7 @@ class Exploits::Osx::Browser::Safar_Metadata_Archive < Msf::Exploit::Remote
the 'zip' command-line utility.
},
'License' => MSF_LICENSE,
'Author' =>
[
'hdm',
],
'Author' => [ 'hdm' ],
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::XXX_CHANGEME_XXX < Msf::Exploit::Remote
},
'Author' => [ 'vlad902 <vlad902@gmail.com>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -15,7 +15,7 @@ class Exploits::Windows::XXX_CHANGEME_XXX < Msf::Exploit::Remote
},
'Author' => [ 'vlad902 <vlad902@gmail.com>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -14,7 +14,7 @@ class Exploits::Windows::XXX_CHANGEME_XXX < Msf::Exploit::Remote
},
'Author' => [ 'Optyx <optyx <at> uberhax0r.net>', 'hdm' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@ -25,7 +25,6 @@ class Exploits::Windows::XXX_CHANGEME_XXX < Msf::Exploit::Remote
{
'Space' => 188,
'BadChars' => "\x00",
},
'Targets' =>
[

View File

@ -17,7 +17,7 @@ class Exploits::Windows::Ftp::FreeFTPDUserOverflow < Msf::Exploit::Remote
},
'Author' => 'MC <y0@w00t-shell.net>',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -24,7 +24,7 @@ class Exploits::Windows::License::CA_Client_GETCONFIG < Msf::Exploit::Remote
},
'Author' => [ 'hdm' ],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Proxy::Bluecoat_WinProxy_Host < Msf::Exploit::Remote
remote execution of arbitrary code.
},
'Author' => 'MC',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[