From 9972f4295388d230cb575eec4591b5195ce0d365 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Thu, 29 Dec 2011 11:01:38 -0600 Subject: [PATCH] Add e-mail for mr_me for consistency --- .../exploits/windows/browser/blackice_downloadimagefileurl.rb | 2 +- .../exploits/windows/browser/imgeviewer_tifmergemultifiles.rb | 2 +- modules/exploits/windows/browser/mozilla_mchannel.rb | 2 +- modules/exploits/windows/browser/mozilla_reduceright.rb | 2 +- modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb | 2 +- modules/exploits/windows/fileformat/aol_desktop_linktag.rb | 2 +- modules/exploits/windows/fileformat/visiwave_vwr_type.rb | 2 +- 7 files changed, 7 insertions(+), 7 deletions(-) diff --git a/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb b/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb index d1a8fbd68d..1a41471bcd 100644 --- a/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb +++ b/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'shinnai', # original discovery - 'mr_me', # msf + 'mr_me ', # msf 'sinn3r' # wbemexec tekniq ], 'Version' => '$Revision$', diff --git a/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb b/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb index 9caaddf1a8..4f2350fbaa 100644 --- a/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb +++ b/modules/exploits/windows/browser/imgeviewer_tifmergemultifiles.rb @@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Dr_IDE', # Vulnerability discovery and original exploit 'TecR0c', # Metasploit module - 'mr_me' # Metasploit module + 'mr_me ' # Metasploit module ], 'Version' => '$Revision: $', 'References' => diff --git a/modules/exploits/windows/browser/mozilla_mchannel.rb b/modules/exploits/windows/browser/mozilla_mchannel.rb index 0b4c63daf3..3f5dc8f47a 100644 --- a/modules/exploits/windows/browser/mozilla_mchannel.rb +++ b/modules/exploits/windows/browser/mozilla_mchannel.rb @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'regenrecht', # discovery 'Rh0', # metasploit module - 'mr_me' # win7 target + 'mr_me ' # win7 target ], 'Version' => "$Revision$", 'References' => diff --git a/modules/exploits/windows/browser/mozilla_reduceright.rb b/modules/exploits/windows/browser/mozilla_reduceright.rb index b0934f2ba3..f388822282 100644 --- a/modules/exploits/windows/browser/mozilla_reduceright.rb +++ b/modules/exploits/windows/browser/mozilla_reduceright.rb @@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Matteo Memelli', #PoC from Exploit-DB 'dookie2000ca', #"Helping" ryujin (Matteo) 'sinn3r', #Metasploit - 'mr_me', #XP target (no aslr) + 'mr_me ', #XP target (no aslr) 'TecR0c', #XP target (no aslr) ], 'References' => diff --git a/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb b/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb index 61a5500979..e6bbd4a9b3 100644 --- a/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb +++ b/modules/exploits/windows/browser/viscom_movieplayer_drawtext.rb @@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'shinnai', # Vulnerability discovery and original exploit 'TecR0c', # Metasploit module - 'mr_me' # Metasploit module + 'mr_me ' # Metasploit module ], 'Version' => '$Revision: $', 'References' => diff --git a/modules/exploits/windows/fileformat/aol_desktop_linktag.rb b/modules/exploits/windows/fileformat/aol_desktop_linktag.rb index aefa3c5bba..6804e1a17f 100644 --- a/modules/exploits/windows/fileformat/aol_desktop_linktag.rb +++ b/modules/exploits/windows/fileformat/aol_desktop_linktag.rb @@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote 'sup3r', #Initial disclosure, poc (9.5) 'sickn3ss', #9.6 poc 'sinn3r', #Metasploit - 'mr_me', #NX bypass target + 'mr_me ', #NX bypass target 'silent_dream', #Win 7 target ], 'References' => diff --git a/modules/exploits/windows/fileformat/visiwave_vwr_type.rb b/modules/exploits/windows/fileformat/visiwave_vwr_type.rb index f6224d5006..3b56096ce4 100644 --- a/modules/exploits/windows/fileformat/visiwave_vwr_type.rb +++ b/modules/exploits/windows/fileformat/visiwave_vwr_type.rb @@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote 'License' => MSF_LICENSE, 'Author' => [ - 'mr_me', # original discovery & msf exploit + 'mr_me ', # original discovery & msf exploit 'TecR0c' # msf exploit ], 'Version' => '$Revision$',