Format dictatorship round 2: Fix author e-mail format for all exploit modules
git-svn-id: file:///home/svn/framework3/trunk@13297 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
21aae8f749
commit
f47a2c7565
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits remote code execution vulnerabilities in dRuby
|
||||
},
|
||||
'Author' => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
|
||||
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Spreecommerce API searchlogic. Unvalidated input is called via the
|
||||
Ruby send method allowing command execution.
|
||||
},
|
||||
'Author' => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
|
||||
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #Phenoelit
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
provides the malicious update server. Requests must be redirected to
|
||||
this server by other means for this exploit to work.
|
||||
},
|
||||
'Author' => [ 'Moritz Jodeit <moritz@jodeit.org>' ],
|
||||
'Author' => [ 'Moritz Jodeit <moritz[at]jodeit.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
The original exploit code was published in the book
|
||||
Shellcoder's Handbook.
|
||||
},
|
||||
'Author' => [ 'noir <noir@uberhax0r.net>', 'hdm' ],
|
||||
'Author' => [ 'noir <noir[at]uberhax0r.net>', 'hdm' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
Vulnerable systems include solaris 2.7, 8, and 9
|
||||
},
|
||||
'Author' => [ 'vlad902 <vlad902@gmail.com>', 'hdm', 'cazz' ],
|
||||
'Author' => [ 'vlad902 <vlad902[at]gmail.com>', 'hdm', 'cazz' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Vulnerable systems include Solaris 2.7, 8, 9, and 10, when
|
||||
ypupdated is started with the '-i' command-line option.
|
||||
},
|
||||
'Author' => [ 'I)ruid <druid@caughq.org>' ],
|
||||
'Author' => [ 'I)ruid <druid[at]caughq.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Redmine repository controller. The flaw is triggered when a rev parameter
|
||||
is passed to the command line of the SCM tool without adequate filtering.
|
||||
},
|
||||
'Author' => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
|
||||
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #Phenoelit
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
"LoadOpf()" method.
|
||||
},
|
||||
'License' => BSD_LICENSE,
|
||||
'Author' => [ 'LSO <lso@hushmail.com>' ],
|
||||
'Author' => [ 'LSO <lso[at]hushmail.com>' ],
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Exploitation is limited by the fact that its is not possible for attackers to supply
|
||||
command line options.
|
||||
},
|
||||
'Author' => 'Yorick Koster <yorick@akitasecurity.nl>',
|
||||
'Author' => 'Yorick Koster <yorick[at]akitasecurity.nl>',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Exploitation is limited by the fact that its is not possible for attackers to supply
|
||||
command line options.
|
||||
},
|
||||
'Author' => 'Yorick Koster <yorick@akitasecurity.nl>',
|
||||
'Author' => 'Yorick Koster <yorick[at]akitasecurity.nl>',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
including dbsnmp:dbsmp, scott:tiger, system:manager, and
|
||||
sys:change_on_install.
|
||||
},
|
||||
'Author' => [ 'MC', 'David Litchfield <david@ngssoftware.com>' ],
|
||||
'Author' => [ 'MC', 'David Litchfield <david[at]ngssoftware.com>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'Platform' => [ 'win' ],
|
||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
command in IPSWITCH WS_FTP Server 5.03 discovered by Reed
|
||||
Arvin.
|
||||
},
|
||||
'Author' => [ 'et', 'Reed Arvin <reedarvin@gmail.com>' ],
|
||||
'Author' => [ 'et', 'Reed Arvin <reedarvin[at]gmail.com>' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'Platform' => [ 'win' ],
|
||||
|
|
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
NOTE: repeated exploitation attempts may cause eDirectory to crash. It does
|
||||
not restart automatically in a default installation.
|
||||
},
|
||||
'Author' => [ 'anonymous', 'Matt Olney <scacynwrig@yahoo.com>' ],
|
||||
'Author' => [ 'anonymous', 'Matt Olney <scacynwrig[at]yahoo.com>' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
but only till you fill the threadpool.
|
||||
|
||||
},
|
||||
'Author' => [ 'spoonm', 'Luigi Auriemma <aluigi@autistici.org>' ],
|
||||
'Author' => [ 'spoonm', 'Luigi Auriemma <aluigi[at]autistici.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
at once. This module has been successfully tested against
|
||||
1.4.1. Version 1.3.4 and below do not seem to be vulnerable.
|
||||
},
|
||||
'Author' => [ 'acaro <acaro@jervus.it>' ],
|
||||
'Author' => [ 'acaro <acaro[at]jervus.it>' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
STMux.exe service we are able to overwrite SEH. Based on the exploit
|
||||
by Manuel Santamarina Suarez.
|
||||
},
|
||||
'Author' => [ 'patrick', 'riaf <riaf@mysec.org>' ],
|
||||
'Author' => [ 'patrick', 'riaf <riaf[at]mysec.org>' ],
|
||||
'Arch' => [ ARCH_X86 ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
|
|
|
@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
equivalent bind payloads. Your mileage may vary.
|
||||
|
||||
},
|
||||
'Author' => [ 'Solar Eclipse <solareclipse@phreedom.org>' ],
|
||||
'Author' => [ 'Solar Eclipse <solareclipse[at]phreedom.org>' ],
|
||||
'License' => GPL_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
Possibly Affected version 0.5, 0.4.5.1, 0.4.5. Eip point to
|
||||
jmp ebx opcode in ws_32.dll
|
||||
},
|
||||
'Author' => [ 'acaro <acaro@jervus.it>' ],
|
||||
'Author' => [ 'acaro <acaro[at]jervus.it>' ],
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue