Fix #53, use Author, not Authors

git-svn-id: file:///home/svn/framework3/trunk@4529 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2007-03-12 01:08:18 +00:00
parent 6c82219b81
commit f915504cfa
13 changed files with 22 additions and 22 deletions

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::AWStats_ConfigDir_Execution < Msf::Exploit::Remote
AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2
are vulnerable.
},
'Authors' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -26,7 +26,7 @@ class Exploits::Unix::Webapp::Barracuda_Image_Execution < Msf::Exploit::Remote
This module exploits an arbitrary command execution vulnerability in the
Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.
},
'Authors' => [ 'Nicolas Gregoire <ngregoire[at]exaprobe.com>', 'hdm' ],
'Author' => [ 'Nicolas Gregoire <ngregoire[at]exaprobe.com>', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::Cacti_GraphImage_Execution < Msf::Exploit::Remote
Raxnet Cacti 'graph_image.php' script. All versions of Raxnet Cacti prior to
0.8.6-d are vulnerable.
},
'Authors' => [ 'David Maciejak <david.maciejak[at]kyxar.fr>', 'hdm' ],
'Author' => [ 'David Maciejak <david.maciejak[at]kyxar.fr>', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Google_ProxyStyleSheet_Execute < Msf::Exploit::Rem
their client base in August of 2005 (GA-2005-08-m). The target appliance
must be able to connect back to your machine for this exploit to work.
},
'Authors' => [ 'hdm' ],
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -27,7 +27,7 @@ class Exploits::Unix::Webapp::OpenView_ConnectedNodes_Execution < Msf::Exploit::
HP OpenView connectedNodes.ovpl CGI application. The results of the command
will be displayed to the screen.
},
'Authors' => [ 'Valerio Tesei <valk[at]mojodo.it>', 'hdm' ],
'Author' => [ 'Valerio Tesei <valk[at]mojodo.it>', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Pajax_Execute < Msf::Exploit::Remote
Additionally, it is possible to include arbitrary files on the server
ending in ".class.php".
},
'Authors' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -28,7 +28,7 @@ class Exploits::Unix::Webapp::Wordpress_LastPost_Execution < Msf::Exploit::Remot
option is enabled (common for hosting providers). All versions of WordPress prior to
1.5.1.3 are affected.
},
'Authors' => [ 'str0ke <str0ke [at] milw0rm.com>', 'hdm' ],
'Author' => [ 'str0ke <str0ke [at] milw0rm.com>', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -34,7 +34,7 @@ class Exploits::Windows::Driver::Broadcom_WiFi_SSID < Msf::Exploit::Remote
(external/ruby-lorcon/README) for more information.
},
'Authors' =>
'Author' =>
[
'Chris Eagle', # initial discovery
'Johnny Cache <johnnycsh [at] 802.11mercenary.com>', # the man with the plan

View File

@ -53,7 +53,7 @@ class Exploits::Windows::Driver::DLink_DWL_G132_WiFi_Rates < Msf::Exploit::Remot
(external/ruby-lorcon/README) for more information.
},
'Authors' =>
'Author' =>
[
'hdm', # discovery, exploit dev
'skape', # windows kernel ninjitsu

View File

@ -50,7 +50,7 @@ class Exploits::Windows::Driver::Netgear_WiFi_Beacon < Msf::Exploit::Remote
(external/ruby-lorcon/README) for more information.
},
'Authors' =>
'Author' =>
[
'hdm'
],

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -27,7 +27,7 @@ class Exploits::Windows::Misc::BakboneNetvaultHeap < Msf::Exploit::Remote
Process Manager service. This code is a direct port of the netvault.c
code written by nolimit and BuzzDee.
},
'Authors' => [ 'hdm', '<nolimit.bugtraq[at]ri0tnet.net>' ],
'Author' => [ 'hdm', '<nolimit.bugtraq[at]ri0tnet.net>' ],
'Version' => '$Revision$',
'References' =>
[

View File

@ -1,5 +1,5 @@
##
# $Id:$
# $Id$
##
##
@ -31,7 +31,7 @@ class Exploits::Windows::Misc::BomberCloneOverflow < Msf::Exploit::Remote
ATTENTION
The shellcode is exec ONLY when someone try to close bomberclone.
},
'Authors' => 'Jacopo Cervini <acaro[at]jervus.it>',
'Author' => 'Jacopo Cervini <acaro[at]jervus.it>',
'Version' => '$Revision$',
'References' =>
[

View File

@ -28,7 +28,7 @@ class Exploits::Windows::Misc::Eiqnetworks_LICMGR_ADDLICENSE < Msf::Exploit::Rem
buffer overflow occurs. This module has only been tested
against ESA v2.1.13.
},
'Authors' => [ 'MC', 'ri0t <ri0t[at]ri0tnet.net>', 'KF <kf_list[at]digitalmunition.com>' ],
'Author' => [ 'MC', 'ri0t <ri0t[at]ri0tnet.net>', 'KF <kf_list[at]digitalmunition.com>' ],
'Version' => '$Revision$',
'References' =>
[