change unknown license to GPL

git-svn-id: file:///home/svn/incoming/trunk@3379 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Matt Miller
2006-01-16 03:48:36 +00:00
parent 08027a53c7
commit 68a8a5262b
30 changed files with 30 additions and 30 deletions
+1 -1
View File
@@ -16,7 +16,7 @@ class LongXor < Msf::Encoder::Xor
},
'Author' => [ 'Dino Dai Zovi <ddz [at] theta44.org>', 'hdm' ],
'Arch' => ARCH_PPC,
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Decoder' =>
{
'KeySize' => 4,
+1 -1
View File
@@ -15,7 +15,7 @@ class LongXorTag < Msf::Encoder::XorAdditiveFeedback
},
'Author' => [ 'optyx', 'hdm' ],
'Arch' => ARCH_SPARC,
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Decoder' =>
{
'KeySize' => 4,
@@ -26,7 +26,7 @@ class Exploits::Linux::Games::UT2004_Secure < Msf::Exploit::Remote
},
'Author' => [ 'onetwo' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
+1 -1
View File
@@ -16,7 +16,7 @@ class Exploits::Linux::Ids::Snortbopre < Msf::Exploit::Remote
full root or administrative privileges.
},
'Author' => 'KaiJern Lau <xwings [at] mysec.org>',
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
+1 -1
View File
@@ -16,7 +16,7 @@ class Exploits::Osx::Ftp::WebStarFTPUserOverflow < Msf::Exploit::Remote
},
'Author' => [ 'Dino Dai Zovi <ddz [at] theta44.org>', 'hdm' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
+1 -1
View File
@@ -17,7 +17,7 @@ class Exploits::Solaris::Dtspcd::Heap_Noir < Msf::Exploit::Remote
},
'Author' => [ 'noir <noir@uberhax0r.net>', 'hdm' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
+1 -1
View File
@@ -14,7 +14,7 @@ class Exploits::Solaris::Telnet::TTYPrompt_Auth_Bypass < Msf::Exploit::Remote
application to bypass authentication in the telnet daemon.
},
'Author' => [ 'MC' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -17,7 +17,7 @@ class Exploits::Windows::Ftp::FreeFTPDUserOverflow < Msf::Exploit::Remote
},
'Author' => 'MC <y0@w00t-shell.net>',
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -15,7 +15,7 @@ class Exploits::Windows::Ftp::GlobalScapeInputOverflow < Msf::Exploit::Remote
or anonymous access) is required for this exploit to work.
},
'Author' => [ 'Fairuzan Roslan <riaf [at] mysec.org>', 'Mati Aharoni <mati [at] see-security.com>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -20,7 +20,7 @@ class Exploits::Windows::Ftp::Oracle9iXDPPassOverflow < Msf::Exploit::Remote
},
'Author' => [ 'y0 <y0[at]w00t-shell.net>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -22,7 +22,7 @@ class Exploits::Windows::Ftp::Oracle9iXDBUnlockOverflow < Msf::Exploit::Remote
},
'Author' => [ 'y0 <y0@w00t-shell.net>', 'David Litchfield <david@ngssoftware.com>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -18,7 +18,7 @@ class Exploits::Windows::Ftp::SlimFTPdListConcatOverflow < Msf::Exploit::Remote
},
'Author' => [ 'Fairuzan Roslan <riaf [at] mysec.org>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -14,7 +14,7 @@ class Exploits::Windows::Ftp::WarFtpd165 < Msf::Exploit::Remote
of War-FTPD 1.65.
},
'Author' => 'Fairuzan Roslan <riaf [at] mysec.org>',
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -16,7 +16,7 @@ class Exploits::Windows::Ftp::WSFTPDMKDOverflow < Msf::Exploit::Remote
},
'Author' => [ 'ET LoWNOISE <et@cyberspace.org>', 'Reed Arvin <reedarvin@gmail.com>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -16,7 +16,7 @@ class Exploits::Windows::Http::ALTN_WebAdmin_Overflow < Msf::Exploit::Remote
execution with SYSTEM level privileges.
},
'Author' => [ 'MC' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -16,7 +16,7 @@ class Exploits::Windows::Http::EDirectory_IMonitor_Overflow < Msf::Exploit::Remo
},
'Author' => [ 'anonymous' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -19,7 +19,7 @@ class Exploits::Windows::Http::Minishare_GET_Overflow < Msf::Exploit::Remote
},
'Author' => [ 'acaro <acaro@jervus.it>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -18,7 +18,7 @@ class Exploits::Windows::Http::Shoutcast_Format < Msf::Exploit::Remote
},
'Author' => [ 'MC', 'mandragore[at]gmail.com'],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -18,7 +18,7 @@ class Exploits::Windows::Imap::MailEnableImapStatusOverflow < Msf::Exploit::Remo
},
'Author' => [ 'MC' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -20,7 +20,7 @@ class Exploits::Windows::Imap::MailEnableImapW3CLoggingSelectOverflow < Msf::Exp
},
'Author' => [ 'MC' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -16,7 +16,7 @@ class Exploits::Windows::Imap::MDaemonImapCramMD5Overflow < Msf::Exploit::Remote
},
'Author' => [ 'anonymous' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -14,7 +14,7 @@ class Exploits::Windows::Imap::MercuryIMAPRenameOverflow < Msf::Exploit::Remote
Mercury/32 v.4.01a IMAP service.
},
'Author' => [ 'MC' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -18,7 +18,7 @@ class Exploits::Windows::Mssql::MS02_056_HelloOverflow < Msf::Exploit::Remote
},
'Author' => [ 'MC <y0@w00t-shell.net>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -16,7 +16,7 @@ class Exploits::Windows::Novell::ZenworksDesktopAgentOverflow < Msf::Exploit::Re
},
'Author' => [ 'anonymous' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -16,7 +16,7 @@ class Exploits::Windows::Proxy::Bluecoat_WinProxy_Host < Msf::Exploit::Remote
remote execution of arbitrary code.
},
'Author' => 'MC',
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -32,7 +32,7 @@ class Exploits::Windows::Smb::MS04_007_ASN1_KILLBILL < Msf::Exploit::Remote
},
'Author' => [ 'Solar Eclipse <solareclipse@phreedom.org>' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'License' => [ 'gplv2' ],
'Version' => '$Revision$',
'References' =>
@@ -17,7 +17,7 @@ class Exploits::Windows::Smb::MS04_039_NETDDE < Msf::Exploit::Remote
Auth seems to be required to reach the nddeapi entrypoint.
},
'Author' => [ 'pusscat' ],
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Version' => '$Revision$',
'References' =>
[
@@ -18,7 +18,7 @@ module ShellBindTcp
'Version' => '$Revision$',
'Description' => 'Listen for a connection and spawn a command shell',
'Author' => 'bighawk <bighawk@warfare.com>',
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Platform' => 'solaris',
'Arch' => ARCH_X86,
'Handler' => Msf::Handler::BindTcp,
@@ -18,7 +18,7 @@ module ShellFindPort
'Version' => '$Revision$',
'Description' => 'Spawn a shell on an established connection',
'Author' => 'LSD <unknown@lsd>',
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Platform' => 'solaris',
'Arch' => ARCH_X86,
'Handler' => Msf::Handler::FindPort,
@@ -18,7 +18,7 @@ module ShellReverseTcp
'Version' => '$Revision$',
'Description' => 'Connect back to attacker and spawn a command shell',
'Author' => 'bighawk <bighawk@warfare.com>',
'License' => UNKNOWN_LICENSE,
'License' => GPL_LICENSE,
'Platform' => 'solaris',
'Arch' => ARCH_X86,
'Handler' => Msf::Handler::ReverseTcp,