1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

More cleanup, mostly abysssec

[See #5012]
This commit is contained in:
Tod Beardsley 2015-04-02 16:16:38 -05:00
parent 11057e5b3b
commit 3ff91d74ca
No known key found for this signature in database
GPG Key ID: BD63D0A3EA19CAAC
4 changed files with 11 additions and 11 deletions

View File

@ -25,9 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Alexander Gavrun', #RCA
'Abysssec', #PoC
'sinn3r' #Metasploit
'Alexander Gavrun', # RCA
'Unknown', # Abysssec, proof of concept
'sinn3r' # Metasploit
],
'References' =>
[

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module exploits a weakness in the Adobe Shockwave player's handling of
Director movies (.DIR). A memory corruption vulnerability occurs through an undocumented
rcsL chunk. This vulnerability was discovered by http://www.abysssec.com.
rcsL chunk.
},
'License' => MSF_LICENSE,
'Author' => [ 'David Kennedy "ReL1K" <kennedyd013[at]gmail.com>'],

View File

@ -23,10 +23,10 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Aniway', #Initial discovery (via ZDI)
'abysssec', #RCA, poc
'sinn3r', #Metasploit
'juan vazquez' #Metasploit
'Aniway', # Initial discovery (via ZDI)
'Unknown', # Abysssec, RCA, poc
'sinn3r', # Metasploit
'juan vazquez' # Metasploit
],
'References' =>
[

View File

@ -21,9 +21,9 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'Abdul-Aziz Hariri', # Vulnerability discovery
'Abysssec', # PoC
'juan vazquez' # Metasploit module
'AbdulAziz Hariri', # Vulnerability discovery
'Unknown', # Abysssec, PoC
'juan vazquez' # Metasploit module
],
'References' =>
[