1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

MC asked us to place his code under MSF license

git-svn-id: file:///home/svn/framework3/trunk@3714 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2006-06-21 18:38:40 +00:00
parent bb0def749f
commit fdd7f4fd74
10 changed files with 10 additions and 10 deletions

View File

@ -14,7 +14,7 @@ class Exploits::Solaris::Telnet::TTYPrompt_Auth_Bypass < Msf::Exploit::Remote
application to bypass authentication in the telnet daemon.
},
'Author' => [ 'MC', 'cazz' ],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -17,7 +17,7 @@ class Exploits::Windows::Ftp::FreeFTPDUserOverflow < Msf::Exploit::Remote
},
'Author' => 'MC <y0@w00t-shell.net>',
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Http::ALTN_WebAdmin_Overflow < Msf::Exploit::Remote
execution with SYSTEM level privileges.
},
'Author' => [ 'MC' ],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Http::Shoutcast_Format < Msf::Exploit::Remote
},
'Author' => [ 'MC', 'mandragore[at]gmail.com'],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Imap::MailEnableImapStatusOverflow < Msf::Exploit::Remo
},
'Author' => [ 'MC' ],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -20,7 +20,7 @@ class Exploits::Windows::Imap::MailEnableImapW3CLoggingSelectOverflow < Msf::Exp
},
'Author' => [ 'MC' ],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -14,7 +14,7 @@ class Exploits::Windows::Imap::MercuryIMAPRenameOverflow < Msf::Exploit::Remote
Mercury/32 v.4.01a IMAP service.
},
'Author' => [ 'MC' ],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Mssql::MS02_056_HelloOverflow < Msf::Exploit::Remote
},
'Author' => [ 'MC <y0@w00t-shell.net>' ],
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Proxy::Bluecoat_WinProxy_Host < Msf::Exploit::Remote
remote execution of arbitrary code.
},
'Author' => 'MC',
'License' => BSD_LICENSE,
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -59,7 +59,7 @@ class Exploits::Windows::Smb::MS06_025_RASMANS_REG < Msf::Exploit::Remote
patt = Rex::Text.pattern_create(1024)
# This triggers eip = 0x51515151 after seh is triggered
patt = "\x51" * 1024
patt = "\x51" * 1060
type2 =
NDR.string( ("\x41" * 1024) + "\x00" ) +