Add reference and disclosure date

bug/bundler_fix
William Vu 2014-08-25 11:46:47 -05:00
parent 9f9f28cc31
commit 7a76efa7f7
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
5 changed files with 35 additions and 25 deletions

View File

@ -22,10 +22,12 @@ class Metasploit3 < Msf::Auxiliary
the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -22,10 +22,12 @@ class Metasploit3 < Msf::Auxiliary
the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -23,10 +23,12 @@ class Metasploit3 < Msf::Auxiliary
allowing remote attackers to cause a denial of services (traffic
amplification) via spoofed requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -24,10 +24,12 @@ class Metasploit3 < Msf::Auxiliary
spoofed requests. The more interfaces, networks or host with specific
restrictions, the greater the amplification.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -22,10 +22,12 @@ class Metasploit3 < Msf::Auxiliary
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
cause a denial of services (traffic amplification) via spoofed requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end