mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
MC asked us to place his code under MSF license
git-svn-id: file:///home/svn/framework3/trunk@3714 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
bb0def749f
commit
fdd7f4fd74
@ -14,7 +14,7 @@ class Exploits::Solaris::Telnet::TTYPrompt_Auth_Bypass < Msf::Exploit::Remote
|
||||
application to bypass authentication in the telnet daemon.
|
||||
},
|
||||
'Author' => [ 'MC', 'cazz' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -17,7 +17,7 @@ class Exploits::Windows::Ftp::FreeFTPDUserOverflow < Msf::Exploit::Remote
|
||||
|
||||
},
|
||||
'Author' => 'MC <y0@w00t-shell.net>',
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -16,7 +16,7 @@ class Exploits::Windows::Http::ALTN_WebAdmin_Overflow < Msf::Exploit::Remote
|
||||
execution with SYSTEM level privileges.
|
||||
},
|
||||
'Author' => [ 'MC' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -18,7 +18,7 @@ class Exploits::Windows::Http::Shoutcast_Format < Msf::Exploit::Remote
|
||||
|
||||
},
|
||||
'Author' => [ 'MC', 'mandragore[at]gmail.com'],
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -18,7 +18,7 @@ class Exploits::Windows::Imap::MailEnableImapStatusOverflow < Msf::Exploit::Remo
|
||||
|
||||
},
|
||||
'Author' => [ 'MC' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -20,7 +20,7 @@ class Exploits::Windows::Imap::MailEnableImapW3CLoggingSelectOverflow < Msf::Exp
|
||||
|
||||
},
|
||||
'Author' => [ 'MC' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -14,7 +14,7 @@ class Exploits::Windows::Imap::MercuryIMAPRenameOverflow < Msf::Exploit::Remote
|
||||
Mercury/32 v.4.01a IMAP service.
|
||||
},
|
||||
'Author' => [ 'MC' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -18,7 +18,7 @@ class Exploits::Windows::Mssql::MS02_056_HelloOverflow < Msf::Exploit::Remote
|
||||
|
||||
},
|
||||
'Author' => [ 'MC <y0@w00t-shell.net>' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -16,7 +16,7 @@ class Exploits::Windows::Proxy::Bluecoat_WinProxy_Host < Msf::Exploit::Remote
|
||||
remote execution of arbitrary code.
|
||||
},
|
||||
'Author' => 'MC',
|
||||
'License' => BSD_LICENSE,
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -59,7 +59,7 @@ class Exploits::Windows::Smb::MS06_025_RASMANS_REG < Msf::Exploit::Remote
|
||||
patt = Rex::Text.pattern_create(1024)
|
||||
|
||||
# This triggers eip = 0x51515151 after seh is triggered
|
||||
patt = "\x51" * 1024
|
||||
patt = "\x51" * 1060
|
||||
|
||||
type2 =
|
||||
NDR.string( ("\x41" * 1024) + "\x00" ) +
|
||||
|
Loading…
Reference in New Issue
Block a user