Fix #53, use Author, not Authors

git-svn-id: file:///home/svn/framework3/trunk@4529 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2007-03-12 01:08:18 +00:00
parent 6c82219b81
commit f915504cfa
13 changed files with 22 additions and 22 deletions

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::AWStats_ConfigDir_Execution < Msf::Exploit::Remote
AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2 AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2
are vulnerable. are vulnerable.
}, },
'Authors' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -26,7 +26,7 @@ class Exploits::Unix::Webapp::Barracuda_Image_Execution < Msf::Exploit::Remote
This module exploits an arbitrary command execution vulnerability in the This module exploits an arbitrary command execution vulnerability in the
Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable. Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.
}, },
'Authors' => [ 'Nicolas Gregoire <ngregoire[at]exaprobe.com>', 'hdm' ], 'Author' => [ 'Nicolas Gregoire <ngregoire[at]exaprobe.com>', 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::Cacti_GraphImage_Execution < Msf::Exploit::Remote
Raxnet Cacti 'graph_image.php' script. All versions of Raxnet Cacti prior to Raxnet Cacti 'graph_image.php' script. All versions of Raxnet Cacti prior to
0.8.6-d are vulnerable. 0.8.6-d are vulnerable.
}, },
'Authors' => [ 'David Maciejak <david.maciejak[at]kyxar.fr>', 'hdm' ], 'Author' => [ 'David Maciejak <david.maciejak[at]kyxar.fr>', 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Google_ProxyStyleSheet_Execute < Msf::Exploit::Rem
their client base in August of 2005 (GA-2005-08-m). The target appliance their client base in August of 2005 (GA-2005-08-m). The target appliance
must be able to connect back to your machine for this exploit to work. must be able to connect back to your machine for this exploit to work.
}, },
'Authors' => [ 'hdm' ], 'Author' => [ 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::OpenView_ConnectedNodes_Execution < Msf::Exploit::
HP OpenView connectedNodes.ovpl CGI application. The results of the command HP OpenView connectedNodes.ovpl CGI application. The results of the command
will be displayed to the screen. will be displayed to the screen.
}, },
'Authors' => [ 'Valerio Tesei <valk[at]mojodo.it>', 'hdm' ], 'Author' => [ 'Valerio Tesei <valk[at]mojodo.it>', 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Pajax_Execute < Msf::Exploit::Remote
Additionally, it is possible to include arbitrary files on the server Additionally, it is possible to include arbitrary files on the server
ending in ".class.php". ending in ".class.php".
}, },
'Authors' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Wordpress_LastPost_Execution < Msf::Exploit::Remot
option is enabled (common for hosting providers). All versions of WordPress prior to option is enabled (common for hosting providers). All versions of WordPress prior to
1.5.1.3 are affected. 1.5.1.3 are affected.
}, },
'Authors' => [ 'str0ke <str0ke [at] milw0rm.com>', 'hdm' ], 'Author' => [ 'str0ke <str0ke [at] milw0rm.com>', 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -34,7 +34,7 @@ class Exploits::Windows::Driver::Broadcom_WiFi_SSID < Msf::Exploit::Remote
(external/ruby-lorcon/README) for more information. (external/ruby-lorcon/README) for more information.
}, },
'Authors' => 'Author' =>
[ [
'Chris Eagle', # initial discovery 'Chris Eagle', # initial discovery
'Johnny Cache <johnnycsh [at] 802.11mercenary.com>', # the man with the plan 'Johnny Cache <johnnycsh [at] 802.11mercenary.com>', # the man with the plan

View File

@ -53,7 +53,7 @@ class Exploits::Windows::Driver::DLink_DWL_G132_WiFi_Rates < Msf::Exploit::Remot
(external/ruby-lorcon/README) for more information. (external/ruby-lorcon/README) for more information.
}, },
'Authors' => 'Author' =>
[ [
'hdm', # discovery, exploit dev 'hdm', # discovery, exploit dev
'skape', # windows kernel ninjitsu 'skape', # windows kernel ninjitsu

View File

@ -50,7 +50,7 @@ class Exploits::Windows::Driver::Netgear_WiFi_Beacon < Msf::Exploit::Remote
(external/ruby-lorcon/README) for more information. (external/ruby-lorcon/README) for more information.
}, },
'Authors' => 'Author' =>
[ [
'hdm' 'hdm'
], ],

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -27,7 +27,7 @@ class Exploits::Windows::Misc::BakboneNetvaultHeap < Msf::Exploit::Remote
Process Manager service. This code is a direct port of the netvault.c Process Manager service. This code is a direct port of the netvault.c
code written by nolimit and BuzzDee. code written by nolimit and BuzzDee.
}, },
'Authors' => [ 'hdm', '<nolimit.bugtraq[at]ri0tnet.net>' ], 'Author' => [ 'hdm', '<nolimit.bugtraq[at]ri0tnet.net>' ],
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [

View File

@ -1,5 +1,5 @@
## ##
# $Id:$ # $Id$
## ##
## ##
@ -31,7 +31,7 @@ class Exploits::Windows::Misc::BomberCloneOverflow < Msf::Exploit::Remote
ATTENTION ATTENTION
The shellcode is exec ONLY when someone try to close bomberclone. The shellcode is exec ONLY when someone try to close bomberclone.
}, },
'Authors' => 'Jacopo Cervini <acaro[at]jervus.it>', 'Author' => 'Jacopo Cervini <acaro[at]jervus.it>',
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [

View File

@ -28,7 +28,7 @@ class Exploits::Windows::Misc::Eiqnetworks_LICMGR_ADDLICENSE < Msf::Exploit::Rem
buffer overflow occurs. This module has only been tested buffer overflow occurs. This module has only been tested
against ESA v2.1.13. against ESA v2.1.13.
}, },
'Authors' => [ 'MC', 'ri0t <ri0t[at]ri0tnet.net>', 'KF <kf_list[at]digitalmunition.com>' ], 'Author' => [ 'MC', 'ri0t <ri0t[at]ri0tnet.net>', 'KF <kf_list[at]digitalmunition.com>' ],
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [