diff --git a/modules/exploits/windows/misc/hp_dataprotector_dll_cmd_exec.rb b/modules/exploits/windows/misc/hp_dataprotector_dll_cmd_exec.rb index 9347e2d259..254c593684 100644 --- a/modules/exploits/windows/misc/hp_dataprotector_dll_cmd_exec.rb +++ b/modules/exploits/windows/misc/hp_dataprotector_dll_cmd_exec.rb @@ -18,8 +18,8 @@ class Metasploit3 < Msf::Exploit::Remote A remote command execution is triggered when a crafted command is sent to the Hp Data Protector Manager on TCP Port 5555. }, 'Author' => [ - 'Christian (Polunchis) Ramirez https://intrusionlabs.org', # POC - 'Henoch (Chanoc) Barrera       https://intrusionlabs.org', # POC + 'Christian (Polunchis) Ramirez', # Discovery + 'Henoch (Chanoc) Barrera', # Discovery 'Matthew Hall ' # Metasploit Module ], 'References' =>