Fix #53, use Author, not Authors
git-svn-id: file:///home/svn/framework3/trunk@4529 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
6c82219b81
commit
f915504cfa
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::AWStats_ConfigDir_Execution < Msf::Exploit::Remote
|
||||||
AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2
|
AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2
|
||||||
are vulnerable.
|
are vulnerable.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
|
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -26,7 +26,7 @@ class Exploits::Unix::Webapp::Barracuda_Image_Execution < Msf::Exploit::Remote
|
||||||
This module exploits an arbitrary command execution vulnerability in the
|
This module exploits an arbitrary command execution vulnerability in the
|
||||||
Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.
|
Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'Nicolas Gregoire <ngregoire[at]exaprobe.com>', 'hdm' ],
|
'Author' => [ 'Nicolas Gregoire <ngregoire[at]exaprobe.com>', 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::Cacti_GraphImage_Execution < Msf::Exploit::Remote
|
||||||
Raxnet Cacti 'graph_image.php' script. All versions of Raxnet Cacti prior to
|
Raxnet Cacti 'graph_image.php' script. All versions of Raxnet Cacti prior to
|
||||||
0.8.6-d are vulnerable.
|
0.8.6-d are vulnerable.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'David Maciejak <david.maciejak[at]kyxar.fr>', 'hdm' ],
|
'Author' => [ 'David Maciejak <david.maciejak[at]kyxar.fr>', 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Google_ProxyStyleSheet_Execute < Msf::Exploit::Rem
|
||||||
their client base in August of 2005 (GA-2005-08-m). The target appliance
|
their client base in August of 2005 (GA-2005-08-m). The target appliance
|
||||||
must be able to connect back to your machine for this exploit to work.
|
must be able to connect back to your machine for this exploit to work.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'hdm' ],
|
'Author' => [ 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::OpenView_ConnectedNodes_Execution < Msf::Exploit::
|
||||||
HP OpenView connectedNodes.ovpl CGI application. The results of the command
|
HP OpenView connectedNodes.ovpl CGI application. The results of the command
|
||||||
will be displayed to the screen.
|
will be displayed to the screen.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'Valerio Tesei <valk[at]mojodo.it>', 'hdm' ],
|
'Author' => [ 'Valerio Tesei <valk[at]mojodo.it>', 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Pajax_Execute < Msf::Exploit::Remote
|
||||||
Additionally, it is possible to include arbitrary files on the server
|
Additionally, it is possible to include arbitrary files on the server
|
||||||
ending in ".class.php".
|
ending in ".class.php".
|
||||||
},
|
},
|
||||||
'Authors' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
|
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Wordpress_LastPost_Execution < Msf::Exploit::Remot
|
||||||
option is enabled (common for hosting providers). All versions of WordPress prior to
|
option is enabled (common for hosting providers). All versions of WordPress prior to
|
||||||
1.5.1.3 are affected.
|
1.5.1.3 are affected.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'str0ke <str0ke [at] milw0rm.com>', 'hdm' ],
|
'Author' => [ 'str0ke <str0ke [at] milw0rm.com>', 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -34,7 +34,7 @@ class Exploits::Windows::Driver::Broadcom_WiFi_SSID < Msf::Exploit::Remote
|
||||||
(external/ruby-lorcon/README) for more information.
|
(external/ruby-lorcon/README) for more information.
|
||||||
},
|
},
|
||||||
|
|
||||||
'Authors' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
'Chris Eagle', # initial discovery
|
'Chris Eagle', # initial discovery
|
||||||
'Johnny Cache <johnnycsh [at] 802.11mercenary.com>', # the man with the plan
|
'Johnny Cache <johnnycsh [at] 802.11mercenary.com>', # the man with the plan
|
||||||
|
|
|
@ -53,7 +53,7 @@ class Exploits::Windows::Driver::DLink_DWL_G132_WiFi_Rates < Msf::Exploit::Remot
|
||||||
(external/ruby-lorcon/README) for more information.
|
(external/ruby-lorcon/README) for more information.
|
||||||
},
|
},
|
||||||
|
|
||||||
'Authors' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
'hdm', # discovery, exploit dev
|
'hdm', # discovery, exploit dev
|
||||||
'skape', # windows kernel ninjitsu
|
'skape', # windows kernel ninjitsu
|
||||||
|
|
|
@ -50,7 +50,7 @@ class Exploits::Windows::Driver::Netgear_WiFi_Beacon < Msf::Exploit::Remote
|
||||||
(external/ruby-lorcon/README) for more information.
|
(external/ruby-lorcon/README) for more information.
|
||||||
},
|
},
|
||||||
|
|
||||||
'Authors' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
'hdm'
|
'hdm'
|
||||||
],
|
],
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -27,7 +27,7 @@ class Exploits::Windows::Misc::BakboneNetvaultHeap < Msf::Exploit::Remote
|
||||||
Process Manager service. This code is a direct port of the netvault.c
|
Process Manager service. This code is a direct port of the netvault.c
|
||||||
code written by nolimit and BuzzDee.
|
code written by nolimit and BuzzDee.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'hdm', '<nolimit.bugtraq[at]ri0tnet.net>' ],
|
'Author' => [ 'hdm', '<nolimit.bugtraq[at]ri0tnet.net>' ],
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id:$
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -31,7 +31,7 @@ class Exploits::Windows::Misc::BomberCloneOverflow < Msf::Exploit::Remote
|
||||||
ATTENTION
|
ATTENTION
|
||||||
The shellcode is exec ONLY when someone try to close bomberclone.
|
The shellcode is exec ONLY when someone try to close bomberclone.
|
||||||
},
|
},
|
||||||
'Authors' => 'Jacopo Cervini <acaro[at]jervus.it>',
|
'Author' => 'Jacopo Cervini <acaro[at]jervus.it>',
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -28,7 +28,7 @@ class Exploits::Windows::Misc::Eiqnetworks_LICMGR_ADDLICENSE < Msf::Exploit::Rem
|
||||||
buffer overflow occurs. This module has only been tested
|
buffer overflow occurs. This module has only been tested
|
||||||
against ESA v2.1.13.
|
against ESA v2.1.13.
|
||||||
},
|
},
|
||||||
'Authors' => [ 'MC', 'ri0t <ri0t[at]ri0tnet.net>', 'KF <kf_list[at]digitalmunition.com>' ],
|
'Author' => [ 'MC', 'ri0t <ri0t[at]ri0tnet.net>', 'KF <kf_list[at]digitalmunition.com>' ],
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
|
Loading…
Reference in New Issue