Commit 23b38673 by Marcin Bury

Switching mail address to [at].

parent af3f6918
...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit): ...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit):
'description': 'Exploits asmax password disclosure vulnerability that allows to ' 'description': 'Exploits asmax password disclosure vulnerability that allows to '
'fetch credentials for: Admin, Support and User accounts.', 'fetch credentials for: Admin, Support and User accounts.',
'authors': [ 'authors': [
'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
], ],
'references': [ 'references': [
'https://github.com/lucyoa/exploits/blob/master/asmax/asmax.txt', 'https://github.com/lucyoa/exploits/blob/master/asmax/asmax.txt',
......
...@@ -20,8 +20,8 @@ class Exploit(exploits.Exploit): ...@@ -20,8 +20,8 @@ class Exploit(exploits.Exploit):
__info__ = { __info__ = {
'name': 'Asmax AR 804 RCE', 'name': 'Asmax AR 804 RCE',
'authors': [ 'authors': [
'Michal Sajdak <michal.sajdak@securitum.com>', # vulnerability discovery 'Michal Sajdak <michal.sajdak[at]securitum.com>', # vulnerability discovery
'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
], ],
'description': 'Module exploits Asmax AR 804 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.', 'description': 'Module exploits Asmax AR 804 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.',
'references': [ 'references': [
......
...@@ -21,7 +21,7 @@ class Exploit(exploits.Exploit): ...@@ -21,7 +21,7 @@ class Exploit(exploits.Exploit):
'description': 'Module exploits password disclosure vulnerability in Asus RT-N16 devices that allows to fetch credentials for the device.', 'description': 'Module exploits password disclosure vulnerability in Asus RT-N16 devices that allows to fetch credentials for the device.',
'authors': [ 'authors': [
'Harry Sintonen', # vulnerability discovery 'Harry Sintonen', # vulnerability discovery
'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
], ],
'references': [ 'references': [
'https://sintonen.fi/advisories/asus-router-auth-bypass.txt' 'https://sintonen.fi/advisories/asus-router-auth-bypass.txt'
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment