Add e-mail for tecr0c

unstable
sinn3r 2011-12-29 11:14:15 -06:00
parent 9972f42953
commit d484e18300
9 changed files with 10 additions and 10 deletions

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
'Plone Security team', # Vulnerability discovery 'Plone Security team', # Vulnerability discovery
'Nick Miles', # Original exploit 'Nick Miles', # Original exploit
'TecR0c' # Metasploit module 'TecR0c <roccogiovannicalvi[at]gmail.com>' # Metasploit module
], ],
'References' => 'References' =>
[ [

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'EgiX', # Vulnerability discovery and exploit 'EgiX', # Vulnerability discovery and exploit
'TecR0c' # Metasploit Module 'TecR0c <roccogiovannicalvi[at]gmail.com>' # Metasploit Module
], ],
'References' => 'References' =>
[ [

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'EgiX', # Vulnerability discovery and exploit 'EgiX', # Vulnerability discovery and exploit
'TecR0c' # Metasploit Module 'TecR0c <roccogiovannicalvi[at]gmail.com>' # Metasploit Module
], ],
'References' => 'References' =>
[ [

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Dr_IDE', # Vulnerability discovery and original exploit 'Dr_IDE', # Vulnerability discovery and original exploit
'TecR0c', # Metasploit module 'TecR0c <roccogiovannicalvi[at]gmail.com>', # Metasploit module
'mr_me <steventhomasseeley[at]gmail.com>' # Metasploit module 'mr_me <steventhomasseeley[at]gmail.com>' # Metasploit module
], ],
'Version' => '$Revision: $', 'Version' => '$Revision: $',

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'dookie2000ca', #"Helping" ryujin (Matteo) 'dookie2000ca', #"Helping" ryujin (Matteo)
'sinn3r', #Metasploit 'sinn3r', #Metasploit
'mr_me <steventhomasseeley[at]gmail.com>', #XP target (no aslr) 'mr_me <steventhomasseeley[at]gmail.com>', #XP target (no aslr)
'TecR0c', #XP target (no aslr) 'TecR0c <roccogiovannicalvi[at]gmail.com>', #XP target (no aslr)
], ],
'References' => 'References' =>
[ [

View File

@ -28,8 +28,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'Luigi Auriemma', # original find 'Luigi Auriemma', # original find
'mr_me <steventhomasseeley[at]gmail-com>', # msf module 'mr_me <steventhomasseeley[at]gmail.com>', # msf module
'TecR0c <roccogiovannicalvi[at]gmail-com >',# msf module 'TecR0c <roccogiovannicalvi[at]gmail.com >',# msf module
], ],
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'shinnai', # Vulnerability discovery and original exploit 'shinnai', # Vulnerability discovery and original exploit
'TecR0c', # Metasploit module 'TecR0c <roccogiovannicalvi[at]gmail.com>', # Metasploit module
'mr_me <steventhomasseeley[at]gmail.com>' # Metasploit module 'mr_me <steventhomasseeley[at]gmail.com>' # Metasploit module
], ],
'Version' => '$Revision: $', 'Version' => '$Revision: $',

View File

@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Author' =>
[ [
'mr_me <steventhomasseeley[at]gmail.com>', # original discovery & msf exploit 'mr_me <steventhomasseeley[at]gmail.com>', # original discovery & msf exploit
'TecR0c' # msf exploit 'TecR0c <roccogiovannicalvi[at]gmail.com>' # msf exploit
], ],
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
'Luigi Auriemma', # Original discovery and poc 'Luigi Auriemma', # Original discovery and poc
'Celil UNUVER', 'Celil UNUVER',
'TecR0c', # Module Metasploit 'TecR0c <roccogiovannicalvi[at]gmail.com>', # Module Metasploit
'sinn3r' 'sinn3r'
], ],
'References' => 'References' =>