mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
parent
11057e5b3b
commit
3ff91d74ca
@ -25,9 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Alexander Gavrun', #RCA
|
||||
'Abysssec', #PoC
|
||||
'sinn3r' #Metasploit
|
||||
'Alexander Gavrun', # RCA
|
||||
'Unknown', # Abysssec, proof of concept
|
||||
'sinn3r' # Metasploit
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'Description' => %q{
|
||||
This module exploits a weakness in the Adobe Shockwave player's handling of
|
||||
Director movies (.DIR). A memory corruption vulnerability occurs through an undocumented
|
||||
rcsL chunk. This vulnerability was discovered by http://www.abysssec.com.
|
||||
rcsL chunk.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'David Kennedy "ReL1K" <kennedyd013[at]gmail.com>'],
|
||||
|
@ -23,10 +23,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Aniway', #Initial discovery (via ZDI)
|
||||
'abysssec', #RCA, poc
|
||||
'sinn3r', #Metasploit
|
||||
'juan vazquez' #Metasploit
|
||||
'Aniway', # Initial discovery (via ZDI)
|
||||
'Unknown', # Abysssec, RCA, poc
|
||||
'sinn3r', # Metasploit
|
||||
'juan vazquez' # Metasploit
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
|
@ -21,9 +21,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
'Abdul-Aziz Hariri', # Vulnerability discovery
|
||||
'Abysssec', # PoC
|
||||
'juan vazquez' # Metasploit module
|
||||
'AbdulAziz Hariri', # Vulnerability discovery
|
||||
'Unknown', # Abysssec, PoC
|
||||
'juan vazquez' # Metasploit module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
|
Loading…
Reference in New Issue
Block a user