Correct author e-mail format

unstable
sinn3r 2012-02-02 11:27:43 -06:00
parent 1676bd3c4f
commit aa44eb955e
3 changed files with 3 additions and 3 deletions

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
prior to version 7.0.3FP1 and 8.0.1. This flaw is triggered by any HTTP prior to version 7.0.3FP1 and 8.0.1. This flaw is triggered by any HTTP
request with an Accept-Language header greater than 114 bytes. request with an Accept-Language header greater than 114 bytes.
}, },
'Author' => [ 'Fairuzan Roslan riaf[at]mysec.org', 'Earl Marcus klks[at]mysec.org' ], 'Author' => [ 'Fairuzan Roslan <riaf[at]mysec.org>', '<Earl Marcus klks[at]mysec.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
without SP1 does not seem affected by this flaw. without SP1 does not seem affected by this flaw.
}, },
'Author' => [ 'laurent.gaffie[at]gmail.com', 'hdm', 'sf' ], 'Author' => [ 'Laurent Gaffie <laurent.gaffie[at]gmail.com>', 'hdm', 'sf' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
crafted key exchange algorithm string received from an SSH client. crafted key exchange algorithm string received from an SSH client.
This module is based on MC's freesshd_key_exchange exploit. This module is based on MC's freesshd_key_exchange exploit.
}, },
'Author' => 'riaf [at] mysec.org', 'Author' => 'riaf <riaf[at]mysec.org>',
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>