Format dictatorship round 2: Fix author e-mail format for all exploit modules

git-svn-id: file:///home/svn/framework3/trunk@13297 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Wei Chen 2011-07-22 20:17:58 +00:00
parent 21aae8f749
commit f47a2c7565
18 changed files with 18 additions and 18 deletions

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module exploits remote code execution vulnerabilities in dRuby
},
'Author' => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
Spreecommerce API searchlogic. Unvalidated input is called via the
Ruby send method allowing command execution.
},
'Author' => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #Phenoelit
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
provides the malicious update server. Requests must be redirected to
this server by other means for this exploit to work.
},
'Author' => [ 'Moritz Jodeit <moritz@jodeit.org>' ],
'Author' => [ 'Moritz Jodeit <moritz[at]jodeit.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
The original exploit code was published in the book
Shellcoder's Handbook.
},
'Author' => [ 'noir <noir@uberhax0r.net>', 'hdm' ],
'Author' => [ 'noir <noir[at]uberhax0r.net>', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
Vulnerable systems include solaris 2.7, 8, and 9
},
'Author' => [ 'vlad902 <vlad902@gmail.com>', 'hdm', 'cazz' ],
'Author' => [ 'vlad902 <vlad902[at]gmail.com>', 'hdm', 'cazz' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
Vulnerable systems include Solaris 2.7, 8, 9, and 10, when
ypupdated is started with the '-i' command-line option.
},
'Author' => [ 'I)ruid <druid@caughq.org>' ],
'Author' => [ 'I)ruid <druid[at]caughq.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
Redmine repository controller. The flaw is triggered when a rev parameter
is passed to the command line of the SCM tool without adequate filtering.
},
'Author' => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #Phenoelit
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
"LoadOpf()" method.
},
'License' => BSD_LICENSE,
'Author' => [ 'LSO <lso@hushmail.com>' ],
'Author' => [ 'LSO <lso[at]hushmail.com>' ],
'Version' => '$Revision$',
'References' =>
[

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
Exploitation is limited by the fact that its is not possible for attackers to supply
command line options.
},
'Author' => 'Yorick Koster <yorick@akitasecurity.nl>',
'Author' => 'Yorick Koster <yorick[at]akitasecurity.nl>',
'Version' => '$Revision$',
'References' =>
[

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
Exploitation is limited by the fact that its is not possible for attackers to supply
command line options.
},
'Author' => 'Yorick Koster <yorick@akitasecurity.nl>',
'Author' => 'Yorick Koster <yorick[at]akitasecurity.nl>',
'Version' => '$Revision$',
'References' =>
[

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
including dbsnmp:dbsmp, scott:tiger, system:manager, and
sys:change_on_install.
},
'Author' => [ 'MC', 'David Litchfield <david@ngssoftware.com>' ],
'Author' => [ 'MC', 'David Litchfield <david[at]ngssoftware.com>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'Platform' => [ 'win' ],

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
command in IPSWITCH WS_FTP Server 5.03 discovered by Reed
Arvin.
},
'Author' => [ 'et', 'Reed Arvin <reedarvin@gmail.com>' ],
'Author' => [ 'et', 'Reed Arvin <reedarvin[at]gmail.com>' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'Platform' => [ 'win' ],

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
NOTE: repeated exploitation attempts may cause eDirectory to crash. It does
not restart automatically in a default installation.
},
'Author' => [ 'anonymous', 'Matt Olney <scacynwrig@yahoo.com>' ],
'Author' => [ 'anonymous', 'Matt Olney <scacynwrig[at]yahoo.com>' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
but only till you fill the threadpool.
},
'Author' => [ 'spoonm', 'Luigi Auriemma <aluigi@autistici.org>' ],
'Author' => [ 'spoonm', 'Luigi Auriemma <aluigi[at]autistici.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
at once. This module has been successfully tested against
1.4.1. Version 1.3.4 and below do not seem to be vulnerable.
},
'Author' => [ 'acaro <acaro@jervus.it>' ],
'Author' => [ 'acaro <acaro[at]jervus.it>' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
STMux.exe service we are able to overwrite SEH. Based on the exploit
by Manuel Santamarina Suarez.
},
'Author' => [ 'patrick', 'riaf <riaf@mysec.org>' ],
'Author' => [ 'patrick', 'riaf <riaf[at]mysec.org>' ],
'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',

View File

@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
equivalent bind payloads. Your mileage may vary.
},
'Author' => [ 'Solar Eclipse <solareclipse@phreedom.org>' ],
'Author' => [ 'Solar Eclipse <solareclipse[at]phreedom.org>' ],
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
Possibly Affected version 0.5, 0.4.5.1, 0.4.5. Eip point to
jmp ebx opcode in ws_32.dll
},
'Author' => [ 'acaro <acaro@jervus.it>' ],
'Author' => [ 'acaro <acaro[at]jervus.it>' ],
'Version' => '$Revision$',
'References' =>
[