Fixes #339. Cleans up author names for the most part - there are still some stragglers, but this should fix up the frequent contributors
git-svn-id: file:///home/svn/framework3/trunk@7173 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
ce25403e18
commit
d3aa513773
|
@ -17,7 +17,7 @@ module Payload::Osx::BundleInject
|
|||
'Description' => 'Inject a custom Mach-O bundle into the exploited process',
|
||||
'Author' =>
|
||||
[
|
||||
'Dino Dai Zovi <ddz@theta44.org>',
|
||||
'ddz',
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'Platform' => 'osx',
|
||||
|
|
|
@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
'hdm', # Original exploit for Mac OS X PPC / Win32
|
||||
'kf', # Added support for Mac OS X X86
|
||||
'ddz ' # Discovered bug, provided tips
|
||||
'ddz' # Discovered bug, provided tips
|
||||
],
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# Metasploit implementation
|
||||
'natron',
|
||||
# bl4cksecurity blog explanation of vuln [see References]
|
||||
'xort & redsand',
|
||||
'xort', 'redsand',
|
||||
# obfuscation techniques and pdf template from util_printf
|
||||
'MC', 'Didier Stevens <didier.stevens[at]gmail.com>',
|
||||
],
|
||||
|
|
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Author' =>
|
||||
[
|
||||
'Chris Eagle', # initial discovery
|
||||
'Johnny Cache <johnnycsh [at] 802.11mercenary.com>', # the man with the plan
|
||||
'Johnny Cache <johnnycsh [at] 802.11mercenary.net>', # the man with the plan
|
||||
'skape', # windows kernel ninjitsu and debugging
|
||||
'hdm' # porting the C version to ruby
|
||||
],
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# Metasploit implementation
|
||||
'natron',
|
||||
# bl4cksecurity blog explanation of vuln [see References]
|
||||
'xort & redsand',
|
||||
'xort', 'redsand',
|
||||
# obfuscation techniques and pdf template from util_printf
|
||||
'MC', 'Didier Stevens <didier.stevens[at]gmail.com>',
|
||||
],
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
header of the web request. MailEnable Enterprise Edition versions priot to 1.0.5 and
|
||||
MailEnable Professional versions prior to 1.55 are affected.
|
||||
},
|
||||
'Author' => 'David Maciejak <david dot maciejak at kyxar dot fr>',
|
||||
'Author' => 'David Maciejak <david.maciejak[at]kyxar.fr>',
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
reboot.
|
||||
|
||||
},
|
||||
'Author' => [ 'hdm', 'bmc' ],
|
||||
'Author' => [ 'hdm', 'cazz' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
Loading…
Reference in New Issue