diff --git a/modules/exploits/windows/browser/adobe_flash_sps.rb b/modules/exploits/windows/browser/adobe_flash_sps.rb index e697cf10b1..c1dbabc00a 100644 --- a/modules/exploits/windows/browser/adobe_flash_sps.rb +++ b/modules/exploits/windows/browser/adobe_flash_sps.rb @@ -25,9 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote 'License' => MSF_LICENSE, 'Author' => [ - 'Alexander Gavrun', #RCA - 'Abysssec', #PoC - 'sinn3r' #Metasploit + 'Alexander Gavrun', # RCA + 'Unknown', # Abysssec, proof of concept + 'sinn3r' # Metasploit ], 'References' => [ diff --git a/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb b/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb index f48ae794ac..022e9a69d6 100644 --- a/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb +++ b/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a weakness in the Adobe Shockwave player's handling of Director movies (.DIR). A memory corruption vulnerability occurs through an undocumented - rcsL chunk. This vulnerability was discovered by http://www.abysssec.com. + rcsL chunk. }, 'License' => MSF_LICENSE, 'Author' => [ 'David Kennedy "ReL1K" '], diff --git a/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb b/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb index 2ae1ec135d..c3fd075511 100644 --- a/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb +++ b/modules/exploits/windows/fileformat/ms11_021_xlb_bof.rb @@ -23,10 +23,10 @@ class Metasploit3 < Msf::Exploit::Remote 'License' => MSF_LICENSE, 'Author' => [ - 'Aniway', #Initial discovery (via ZDI) - 'abysssec', #RCA, poc - 'sinn3r', #Metasploit - 'juan vazquez' #Metasploit + 'Aniway', # Initial discovery (via ZDI) + 'Unknown', # Abysssec, RCA, poc + 'sinn3r', # Metasploit + 'juan vazquez' # Metasploit ], 'References' => [ diff --git a/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb b/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb index 1cbbe3b166..70c5c32675 100644 --- a/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb +++ b/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb @@ -21,9 +21,9 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ - 'Abdul-Aziz Hariri', # Vulnerability discovery - 'Abysssec', # PoC - 'juan vazquez' # Metasploit module + 'AbdulAziz Hariri', # Vulnerability discovery + 'Unknown', # Abysssec, PoC + 'juan vazquez' # Metasploit module ], 'References' => [