Remove bad references (dead links)

These links are no longer available. They are dead links.
bug/bundler_fix
wchen-r7 2015-10-27 12:41:32 -05:00
parent 93a2507223
commit 154fb585f4
204 changed files with 125 additions and 377 deletions

View File

@ -28,9 +28,8 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'BID', '19680' ],
[ 'CVE', '2006-4313' ],
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml' ],
[ 'OSVDB', '28139' ],
[ 'OSVDB', '28138' ],
[ 'OSVDB', '28138' ]
],
'DisclosureDate' => 'Aug 23 2006'))

View File

@ -33,7 +33,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2011-0923' ],
[ 'OSVDB', '72526' ],
[ 'ZDI', '11-055' ],
[ 'URL', 'http://c4an-dl.blogspot.com/hp-data-protector-vuln.html' ],
[ 'URL', 'http://hackarandas.com/blog/2011/08/04/hp-data-protector-remote-shell-for-hpux' ]
],
'Author' =>

View File

@ -46,8 +46,7 @@ class Metasploit3 < Msf::Auxiliary
'References' => [
[ 'CVE', '2015-0964' ], # XSS vulnerability
[ 'CVE', '2015-0965' ], # CSRF vulnerability
[ 'CVE', '2015-0966' ], # "techician/yZgO8Bvj" web interface backdoor
[ 'URL', 'https://community.rapid7.com/rapid7_blogpostdetail?id=a111400000AanBs' ] # Original disclosure
[ 'CVE', '2015-0966' ] # "techician/yZgO8Bvj" web interface backdoor
]
))

View File

@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'EDB', '25252' ],
[ 'OSVDB', '93013' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-018' ],
[ 'URL', 'http://www.dlink.com/de/de/home-solutions/connect/modems-and-gateways/dsl-320b-adsl-2-ethernet-modem' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-018' ]
],
'Author' => [
'Michael Messner <devnull[at]s3cur1ty.de>'

View File

@ -26,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'OSVDB', '89912' ],
[ 'BID', '57760' ],
[ 'EDB', '24475' ],
[ 'URL', 'http://homesupport.cisco.com/de-eu/support/routers/E1500' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-004' ]
],
'DisclosureDate' => 'Feb 05 2013'))

View File

@ -29,7 +29,6 @@ class Metasploit3 < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://homesupport.cisco.com/en-eu/support/routers/WRT54GL' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-01' ],
[ 'URL', 'http://www.s3cur1ty.de/attacking-linksys-wrt54gl' ],
[ 'EDB', '24202' ],

View File

@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
[
['CVE', '2014-7862'],
['OSVDB', '116554'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc9_admin.txt'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/2']
],
'DisclosureDate' => 'Dec 31 2014'))

View File

@ -36,7 +36,6 @@ class Metasploit3 < Msf::Auxiliary
[
['CVE', '2014-7863'],
['OSVDB', '117696'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/114']
],
'DisclosureDate' => 'Jan 28 2015'))

View File

@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
[
['CVE', '2014-7863'],
['OSVDB', '117695'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/114']
],
'DisclosureDate' => 'Jan 28 2015'))

View File

@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'CVE', '2014-8499' ],
[ 'OSVDB', '114485' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Nov/18' ]
],
'DisclosureDate' => 'Nov 8 2014'))

View File

@ -28,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'CVE', '2014-5445' ],
[ 'OSVDB', '115340' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_netflow_it360_file_dl.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Dec/9' ]
],
'DisclosureDate' => 'Nov 30 2014'))

View File

@ -29,9 +29,7 @@ class Metasploit4 < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'https://community.rapid7.com/community/nexpose/blog/2013/08/16/r7-vuln-2013-07-24' ],
# Fill this in with the direct advisory URL from Infigo
[ 'URL', 'http://www.infigo.hr/in_focus/advisories/' ]
[ 'URL', 'https://community.rapid7.com/community/nexpose/blog/2013/08/16/r7-vuln-2013-07-24' ]
],
'DefaultOptions' => {
'SSL' => true

View File

@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2015-2993' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Jun/8' ]
],
'DisclosureDate' => 'Jun 3 2015'))

View File

@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
[
['CVE', '2015-2996'],
['CVE', '2015-2997'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jun/8']
],
'DisclosureDate' => 'Jun 3 2015'))

View File

@ -29,7 +29,6 @@ class Metasploit3 < Msf::Auxiliary
[
['CVE', '2015-2996'],
['CVE', '2015-2998'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt' ],
['URL', 'http://seclists.org/fulldisclosure/2015/Jun/8']
],
'DisclosureDate' => 'Jun 3 2015'))

View File

@ -21,11 +21,7 @@ class Metasploit3 < Msf::Auxiliary
as well as read privileges to the target file.
},
'Author' => [ 'todb' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://michaeldaw.org/sql-injection-cheat-sheet#postgres' ]
]
'License' => MSF_LICENSE
))
register_options(

View File

@ -34,8 +34,7 @@ class Metasploit3 < Msf::Auxiliary
['CVE', '2003-0027'],
['OSVDB', '8201'],
['BID', '6665'],
['URL', 'http://marc.info/?l=bugtraq&m=104326556329850&w=2'],
['URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000898.1-1']
['URL', 'http://marc.info/?l=bugtraq&m=104326556329850&w=2']
],
# Tested OK against sol8.tor 20100624 -jjd
'DisclosureDate' => 'Jan 22 2003')

View File

@ -21,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'https://github.com/claudijd/BNAT-Suite'],
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels'],
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels']
]
)
register_options(

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'https://github.com/claudijd/BNAT-Suite'],
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels'],
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels']
]
)

View File

@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'BID', '1154'],
[ 'CVE', '2000-0380'],
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20000514-ios-http-server.shtml'],
[ 'OSVDB', '1302' ],
],
'DisclosureDate' => 'Apr 26 2000'))

View File

@ -30,8 +30,7 @@ class Metasploit4 < Msf::Auxiliary
'References' => [
['CVE', '2015-5477'],
['URL', 'https://www.isc.org/blogs/cve-2015-5477-an-error-in-handling-tkey-queries-can-cause-named-to-exit-with-a-require-assertion-failure/'],
['URL', 'https://kb.isc.org/article/AA-01272'],
['URL', 'https://github.com/rapid7/metasploit-framework/issues/5790']
['URL', 'https://kb.isc.org/article/AA-01272']
],
'DisclosureDate' => 'Jul 28 2015',
'License' => MSF_LICENSE,

View File

@ -23,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://lists.immunitysec.com/pipermail/dailydave/2006-February/002982.html' ],
[ 'BID', '16838' ],
[ 'OSVDB', '23511' ],
[ 'CVE', '2006-0900' ],

View File

@ -30,7 +30,6 @@ class Metasploit4 < Msf::Auxiliary
'References' =>
[
['CVE', '2014-0050'],
['URL', 'http://markmail.org/message/kpfl7ax4el2owb3o'],
['URL', 'http://tomcat.apache.org/security-8.html'],
['URL', 'http://tomcat.apache.org/security-7.html']
],

View File

@ -26,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary
[
['CVE', '2013-3843'],
['OSVDB', '93853'],
['BID', '60333'],
['URL', 'http://bugs.monkey-project.com/ticket/182']
['BID', '60333']
],
'DisclosureDate' => 'May 30 2013'))

View File

@ -29,8 +29,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'CVE', '2005-4797' ],
[ 'BID', '14510' ],
[ 'OSVDB', '18650' ],
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-26-101842-1'],
[ 'OSVDB', '18650' ]
]
))

View File

@ -28,8 +28,7 @@ class Metasploit4 < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2012-2686'],
[ 'URL', 'https://www.openssl.org/news/secadv_20130205.txt']
[ 'CVE', '2012-2686']
],
'DisclosureDate' => 'Feb 05 2013'))

View File

@ -19,10 +19,6 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => ["Sil3nt_Dre4m"],
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://kaillerahacks.blogspot.com/2011/07/kaillera-server-086-dos-vulnerability.html' ]
],
'DisclosureDate' => 'Jul 2 2011'))
register_options([

View File

@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'OSVDB', '50617' ],
[ 'BID', '5817' ],
[ 'URL', 'http://sh0dan.org/oldfiles/hackingcitrix.html' ],
[ 'BID', '5817' ]
]
))

View File

@ -23,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary
],
'License' => MSF_LICENSE,
'References' => [
['URL', 'http://304geeks.blogspot.com/2013/01/dns-scraping-for-corporate-av-detection.html'],
['URL', 'http://www.rootsecure.net/content/downloads/pdf/dns_cache_snooping.pdf']
['URL', 'http://304geeks.blogspot.com/2013/01/dns-scraping-for-corporate-av-detection.html']
]))
register_options([

View File

@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2014-6039' ],
[ 'OSVDB', '114342' ],
[ 'OSVDB', '114344' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_eventlog_info_disc.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Nov/12' ]
],
'DisclosureDate' => 'Nov 5 2014'))

View File

@ -70,8 +70,7 @@ class Metasploit3 < Msf::Auxiliary
[
['CWE', '425'],
['CVE', '2013-6031'],
['US-CERT-VU', '341526'],
['URL', 'http://www.huaweidevice.co.in/Support/Downloads/'],
['US-CERT-VU', '341526']
],
'DisclosureDate' => "Nov 11 2013" ))

View File

@ -32,7 +32,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2015-0072' ],
[ 'OSVDB', '117876' ],
[ 'MSB', 'MS15-018' ],
[ 'URL', 'http://www.deusen.co.uk/items/insider3show.3362009741042107/'],
[ 'URL', 'http://innerht.ml/blog/ie-uxss.html' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Feb/10' ]
],

View File

@ -31,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2014-4872' ],
[ 'OSVDB', '112741' ],
[ 'US-CERT-VU', '121036' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Oct/34' ]
],
'DisclosureDate' => 'Oct 7 2014'

View File

@ -35,8 +35,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'CVE', '1999-0103' ], # Note, does not actually trigger a flood.
[ 'URL', 'https://www.cert.be/pro/docs/chargensnmp-ddos-attacks-rise' ],
[ 'URL', 'http://tools.ietf.org/html/rfc864' ],
[ 'URL', 'http://tools.ietf.org/html/rfc864' ]
],
'DisclosureDate' => 'Feb 08 1996')

View File

@ -14,8 +14,7 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'DECT Call Scanner',
'Description' => 'This module scans for active DECT calls',
'Author' => [ 'DK <privilegedmode[at]gmail.com>' ],
'License' => MSF_LICENSE,
'References' => [ ['URL', 'http://www.dedected.org'] ]
'License' => MSF_LICENSE
)
end

View File

@ -14,8 +14,7 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'DECT Base Station Scanner',
'Description' => 'This module scans for DECT base stations',
'Author' => [ 'DK <privilegedmode[at]gmail.com>' ],
'License' => MSF_LICENSE,
'References' => [ ['URL', 'http://www.dedected.org'] ]
'License' => MSF_LICENSE
)
end

View File

@ -35,7 +35,6 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'BID', '2936'],
[ 'CVE', '2001-0537'],
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20010627-ios-http-level.shtml'],
[ 'OSVDB', '578' ],
],
'DisclosureDate' => 'Jun 27 2001'))

View File

@ -21,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2011-3305' ],
[ 'OSVDB', '76080'],
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ]
[ 'OSVDB', '76080']
],
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
'License' => MSF_LICENSE

View File

@ -39,7 +39,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2010-2861' ],
[ 'BID', '42342' ],
[ 'OSVDB', '67047' ],
[ 'URL', 'http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-07' ],
[ 'URL', 'http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861' ],
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb10-18.html' ],
]

View File

@ -25,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary
['OSVDB', '70762'],
['CVE', '2011-0049'],
['CVE', '2011-0063'],
['URL', 'https://sitewat.ch/en/Advisory/View/1'],
['URL', 'http://sotiriu.de/adv/NSOADV-2011-003.txt'],
['EDB', '16103']
],

View File

@ -23,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary
},
'References' =>
[
[ 'OSVDB', '80262'],
[ 'URL', 'http://retrogod.altervista.org/9sg_me_adv.htm' ]
[ 'OSVDB', '80262']
],
'Author' =>
[

View File

@ -23,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'OSVDB', '86881' ],
[ 'BID', '57969' ],
[ 'EDB', '24504' ],
[ 'URL', 'http://www.tp-link.com/en/support/download/?model=TL-WA701ND&version=V1' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-011' ]
],
'Author' => [ 'Michael Messner <devnull[at]s3cur1ty.de>' ],

View File

@ -18,10 +18,6 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
Enumerate Poison Ivy Command and Control (C&C) on ports 3460, 80, 8080 and 443. Adaptation of iTrust Python script.
},
'References' =>
[
['URL', 'www.malware.lu/Pro/RAP002_APT1_Technical_backstage.1.0.pdf'],
],
'Author' => ['SeawolfRN'],
'License' => MSF_LICENSE
)

View File

@ -23,10 +23,6 @@ class Metasploit3 < Msf::Auxiliary
The protocol deisgn issue also allows attackers to reset passwords on the device.
},
'Author' => 'Ben Schmidt',
'References' =>
[
[ 'URL', 'http://spareclockcycles.org/exploiting-an-ip-camera-control-protocol/' ],
],
'License' => MSF_LICENSE
)

View File

@ -30,8 +30,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'CVE', '2012-2215' ],
[ 'OSVDB', '80230' ],
[ 'URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=975' ],
[ 'URL', 'http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html' ]
[ 'URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=975' ]
]
))

View File

@ -18,11 +18,7 @@ class Metasploit3 < Msf::Auxiliary
must match the rogue_send parameters used exactly.
},
'Author' => 'hdm',
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'http://www.metasploit.com/research/projects/rogue_network/'],
]
'License' => MSF_LICENSE
)
register_options([

View File

@ -21,11 +21,7 @@ class Metasploit3 < Msf::Auxiliary
system is using as its default route.
},
'Author' => 'hdm',
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'http://www.metasploit.com/research/projects/rogue_network/'],
]
'License' => MSF_LICENSE
)
register_options([

View File

@ -37,7 +37,6 @@ class Metasploit4 < Msf::Auxiliary
'References' => [
[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ],
[ 'URL', 'http://help.sap.com/saphelp_nw70ehp3/helpdata/en/48/6c68b01d5a350ce10000000a42189d/content.htm'],
[ 'URL', 'http://www.onapsis.com/research-free-solutions.php' ], # Bizsploit Opensource ERP Pentesting Framework
[ 'URL', 'http://conference.hitb.org/hitbsecconf2010ams/materials/D2T2%20-%20Mariano%20Nunez%20Di%20Croce%20-%20SAProuter%20.pdf' ]
],
'Author' =>

View File

@ -22,10 +22,6 @@ class Metasploit3 < Msf::Auxiliary
Simply address any of the TODOs.
),
'Author' => 'Joe Contributor <joe_contributor[at]example.com>',
'References' =>
[
['URL', 'https://example.com/~jcontributor']
],
'DisclosureDate' => 'Mar 15 2014',
'License' => MSF_LICENSE
)

View File

@ -47,7 +47,6 @@ class Metasploit3 < Msf::Auxiliary
'References' => [
['CVE', '2015-1793'],
['CWE', '754'],
['URL', 'http://www.openssl.org/news/secadv_20150709.txt'],
['URL', 'http://git.openssl.org/?p=openssl.git;a=commit;h=f404943bcab4898d18f3ac1b36479d1d7bbbb9e6']
],
'DisclosureDate' => 'Jul 9 2015'

View File

@ -24,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2008-3996' ],
[ 'OSVDB', '49321'],
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-08.shtml'],
[ 'OSVDB', '49321']
],
'DisclosureDate' => 'Oct 22 2008'))

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2008-3995' ],
[ 'OSVDB', '49320'],
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-09.shtml' ],
[ 'OSVDB', '49320']
],
'DisclosureDate' => 'Oct 22 2008'))

View File

@ -23,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'CVE', '2008-3982'],
[ 'OSVDB', '49324'],
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ],
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ]
],
'DisclosureDate' => 'Oct 13 2008'))

View File

@ -26,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2007-5511'],
[ 'OSVDB', '40079'],
[ 'BID', '26098' ],
[ 'URL', 'http://rawlab.mindcreations.com/codes/exp/oracle/sys-lt-findricsetV2.sql'],
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2007.html'],
],
'DisclosureDate' => 'Oct 17 2007'))

View File

@ -24,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary
[ 'CVE', '2008-3983'],
[ 'OSVDB', '49325'],
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ],
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
[ 'URL', 'http://www.dsecrg.com/pages/expl/show.php?id=23' ]
],

View File

@ -22,9 +22,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2008-3984' ],
[ 'OSVDB', '49326'],
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
[ 'OSVDB', '49326']
],
'DisclosureDate' => 'Oct 13 2008'))

View File

@ -22,8 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2001-0800'],
['OSVDB', '8573'],
['URL', 'http://www.lsd-pl.net/code/IRIX/irx_lpsched.c'],
['OSVDB', '8573']
],
'Privileged' => false,
'Platform' => %w{ irix unix },

View File

@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['EDB', '36577'],
['URL', 'http://www.bmicrosystems.com/blog/exploiting-the-airties-air-series/'], #advisory
['URL', 'http://www.bmicrosystems.com/exploits/airties5650tt.txt'] #PoC
],
'Targets' =>

View File

@ -24,9 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2006-1148'],
['OSVDB', '23777'],
['BID', '17040'],
['URL', 'http://www.infigo.hr/in_focus/INFIGO-2006-03-01'],
['BID', '17040']
],
'Privileged' => false,
'Payload' =>

View File

@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2011-4828'],
['OSVDB', '77183'],
['BID', '50706'],
['URL', 'http://bugs.v-cms.org/view.php?id=53'],
['URL', 'http://xforce.iss.net/xforce/xfdb/71358']
],
'Payload' =>

View File

@ -33,8 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['OSVDB', '85344'],
['OSVDB', '85345'],
['URL', 'http://itsecuritysolutions.org/2012-08-12-wanem-v2.3-multiple-vulnerabilities/']
['OSVDB', '85345']
],
'Payload' =>
{

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2005-3252'],
['OSVDB', '20034'],
['BID', '15131'],
['URL','http://xforce.iss.net/xforce/alerts/id/207'] ,
['BID', '15131']
],
'Payload' =>
{

View File

@ -50,8 +50,7 @@ class Metasploit4 < Msf::Exploit::Local
[
[ 'CVE', '2009-2692' ],
[ 'OSVDB', '56992' ],
[ 'URL', 'http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html' ],
[ 'URL', 'http://www.grsecurity.net/~spender/wunderbar_emporium2.tgz' ],
[ 'URL', 'http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html' ]
],
'Targets' =>
[

View File

@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'CVE', '2011-0923'],
[ 'OSVDB', '72526'],
[ 'ZDI', '11-055'],
[ 'URL', 'http://c4an-dl.blogspot.com/hp-data-protector-vuln.html'],
[ 'URL', 'http://hackarandas.com/blog/2011/08/04/hp-data-protector-remote-shell-for-hpux'],
[ 'URL', 'https://community.rapid7.com/thread/2253' ]
],

View File

@ -47,8 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '37943' ],
[ 'BID', '37974' ],
[ 'OSVDB', '61956' ],
[ 'URL', 'http://secunia.com/advisories/38344/' ],
[ 'URL', 'http://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.html' ]
[ 'URL', 'http://secunia.com/advisories/38344/' ]
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2015-0936'],
['URL', 'https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15'], # Original Disclosure
['URL', 'https://hdm.io/blog/2015/01/20/partial-disclosure-is-annoying'] # Related issue with hardcoded user:pass
],
'DisclosureDate' => "Apr 01 2015", # Not a joke
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },

View File

@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2012-3579'],
['OSVDB', '85028'],
['BID', '55143'],
['URL', 'https://www.sec-consult.com/files/20120829-0_Symantec_Mail_Gateway_Support_Backdoor.txt'],
['URL', 'http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20120827_00']
],
'DefaultOptions' =>

View File

@ -37,8 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '50500'],
[ 'URL', 'http://slightlyrandombrokenthoughts.blogspot.com/2008/12/calendar-bug.html' ],
[ 'URL', 'http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html' ],
[ 'URL', 'http://blog.cr0.org/2009/05/write-once-own-everyone.html' ],
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-26-244991-1' ]
[ 'URL', 'http://blog.cr0.org/2009/05/write-once-own-everyone.html' ]
],
'Platform' => %w{ linux osx solaris win },
'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },

View File

@ -41,8 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'CVE', '2009-3869' ],
[ 'OSVDB', '59710' ],
[ 'BID', '36881' ],
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1' ],
[ 'ZDI', '09-078' ],
[ 'ZDI', '09-078' ]
],
'Payload' =>
{

View File

@ -38,9 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => [ 'natron' ],
'References' =>
[
[ 'URL', 'http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-valsmith-metaphish.pdf' ],
# list of trusted Certificate Authorities by java version
[ 'URL', 'http://www.spikezilla-software.com/blog/?p=21' ]
[ 'URL', 'http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-valsmith-metaphish.pdf' ]
],
'Platform' => %w{ java linux osx solaris win },
'Payload' => { 'BadChars' => '', 'DisableNops' => true },

View File

@ -41,8 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2006-3677'],
['OSVDB', '27559'],
['BID', '19192'],
['URL', 'http://www.mozilla.org/security/announce/mfsa2006-45.html'],
['URL', 'http://browserfun.blogspot.com/2006/07/mobb-28-mozilla-navigator-object.html'],
['URL', 'http://www.mozilla.org/security/announce/mfsa2006-45.html']
],
'Payload' =>
{

View File

@ -45,7 +45,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2014-3996' ],
[ 'OSVDB', '110198' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/me_dc_pmp_it360_sqli.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Aug/55' ]
],
'Arch' => ARCH_X86,

View File

@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2014-5301'],
['OSVDB', '116733'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_sd_file_upload.txt'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/5']
],
'DefaultOptions' => { 'WfsDelay' => 30 },

View File

@ -24,8 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2012-0261'],
['OSVDB', '78064'],
['URL', 'http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf'],
['URL', 'http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/'],
['URL', 'http://secunia.com/advisories/47417/'],
],
'Privileged' => true,

View File

@ -24,8 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2012-0262'],
['OSVDB', '78065'],
['URL', 'http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf'],
['URL', 'http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/'],
['URL', 'http://secunia.com/advisories/47417/'],
],
'Privileged' => true,

View File

@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2014-6034' ],
[ 'OSVDB', '112276' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Sep/110' ]
],
'Privileged' => true,

View File

@ -41,8 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ "CVE", "2012-3153" ],
[ "OSVDB", "86395" ], # Matches CVE-2012-3152
[ "OSVDB", "86394" ], # Matches CVE-2012-3153
[ "EDB", "31253" ],
[ 'URL', "http://netinfiltration.com" ]
[ "EDB", "31253" ]
],
'Stance' => Msf::Exploit::Stance::Aggressive,
'Platform' => ['win', 'linux'],

View File

@ -32,8 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2011-4075'],
['OSVDB', '76594'],
['BID', '50331'],
['URL', 'http://sourceforge.net/support/tracker.php?aid=3417184'],
['EDB', '18021'],
['EDB', '18021']
],
'Privileged' => false,
'Payload' =>

View File

@ -113,7 +113,6 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'https://charlie.bz/blog/rails-3.2.10-remote-code-execution'], #Initial exploit vector was taken from here
['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/']
],
'DisclosureDate' => 'Apr 11 2013',

View File

@ -35,9 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '51061' ],
[ 'CVE', '2011-4642' ],
[ 'URL', 'http://www.splunk.com/view/SP-CAAAGMM' ],
[ 'URL', 'http://www.sec-1.com/blog/?p=233' ],
[ 'URL', 'http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf' ],
[ 'URL', 'http://www.sec-1.com/blog/wp-content/uploads/2011/12/splunkexploit.zip' ]
[ 'URL', 'http://www.sec-1.com/blog/?p=233' ]
],
'Payload' =>
{

View File

@ -36,8 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2012-0391'],
[ 'OSVDB', '78277'],
[ 'EDB', '18329'],
[ 'URL', 'https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt']
[ 'EDB', '18329']
],
'Platform' => %w{ java linux win },
'Privileged' => true,

View File

@ -35,8 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'CVE', '2012-0394'],
[ 'OSVDB', '78276'],
[ 'EDB', '18329'],
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt' ],
[ 'URL', 'http://www.pwntester.com/blog/2014/01/21/struts-2-devmode/' ]
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt' ]
],
'Platform' => 'java',
'Arch' => ARCH_JAVA,

View File

@ -32,9 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2010-0361' ],
[ 'OSVDB', '61851' ],
[ 'URL', 'http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html' ],
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-275850-1' ]
[ 'OSVDB', '61851' ]
],
'Platform' => [ 'win' ],
'Privileged' => true,

View File

@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2015-2994'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jun/8']
],
'DefaultOptions' => { 'WfsDelay' => 5 },

View File

@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2015-2995' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Jun/8' ]
],
'DefaultOptions' => { 'WfsDelay' => 30 },

View File

@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
['OSVDB', '78508'],
['BID', '51647'],
['URL', 'http://www.vbseo.com/f5/vbseo-security-bulletin-all-supported-versions-patch-release-52783/'],
['EDB', '18424']
],
'Privileged' => false,

View File

@ -33,8 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2011-4451'],
['OSVDB', '77393'],
['EDB', '18177'],
['URL', 'http://wush.net/trac/wikka/ticket/1098']
['EDB', '18177']
],
'Payload' =>
{

View File

@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2015-0779'],
['OSVDB', '120382'],
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt'],
['URL', 'http://seclists.org/fulldisclosure/2015/Apr/21']
],
'DefaultOptions' => { 'WfsDelay' => 30 },

View File

@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'OSVDB', '84913' ],
[ 'EDB', '20168' ],
[ 'URL', 'http://offensivecomputing.net/?q=node/1417'],
[ 'URL', 'http://resources.infosecinstitute.com/pbot-analysis/']
],
'Platform' => %w{ unix win },

View File

@ -26,9 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2004-1389' ],
[ 'OSVDB', '11026' ],
[ 'BID', '11494' ],
[ 'URL', 'http://seer.support.veritas.com/docs/271727.htm' ],
[ 'BID', '11494' ]
],
'Privileged' => true,
'Platform' => %w{ linux unix win },

View File

@ -24,8 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2002-1643' ],
[ 'OSVDB', '4468'],
[ 'URL', 'http://lists.immunitysec.com/pipermail/dailydave/2003-August/000030.html']
[ 'OSVDB', '4468']
],
'Privileged' => true,
'Payload' =>

View File

@ -41,9 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2013-1428'],
['OSVDB', '92653'],
['BID', '59369'],
['URL', 'http://www.floyd.ch/?p=741'],
['URL', 'http://sitsec.net/blog/2013/04/22/stack-based-buffer-overflow-in-the-vpn-software-tinc-for-authenticated-peers/'],
['URL', 'http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1428']
['URL', 'http://www.floyd.ch/?p=741']
],
'DefaultOptions' =>
{

View File

@ -31,9 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
['OSVDB', '55839'],
['US-CERT-VU', '654545'],
['URL', 'http://snosoft.blogspot.com/'],
['URL', 'http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/'],
['URL', 'http://www.wyse.com/serviceandsupport/support/WSB09-01.zip'],
['URL', 'http://www.wyse.com/serviceandsupport/Wyse%20Security%20Bulletin%20WSB09-01.pdf'],
['URL', 'http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/']
],
'Privileged' => true,
'Payload' =>

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2005-0491'],
[ 'OSVDB', '14011'],
[ 'BID', '12594'],
[ 'URL', 'http://lists.netsys.com/pipermail/full-disclosure/2005-February/031831.html'],
[ 'BID', '12594']
],
'Privileged' => true,
'Payload' =>

View File

@ -27,8 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2003-0722'],
['OSVDB', '4585'],
['BID', '8615'],
['URL', 'http://lists.insecure.org/lists/vulnwatch/2003/Jul-Sep/0115.html'],
['BID', '8615']
],
'Privileged' => true,
'Platform' => %w{ solaris unix },

View File

@ -23,8 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'OSVDB', '69562'],
[ 'BID', '45150' ],
[ 'URL', 'http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org' ],
[ 'BID', '45150' ]
],
'Privileged' => true,
'Platform' => [ 'unix' ],

View File

@ -32,8 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2012-5975'],
['EDB', '23082'],
['OSVDB', '88103'],
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12'],
['URL', 'http://www.ssh.com/index.php/component/content/article/531.html']
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12']
],
'Payload' =>
{

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2008-3922'],
['OSVDB', '47807'],
['BID', '30856'],
['URL', 'http://userwww.service.emory.edu/~ekenda2/EMORY-2008-01.txt'],
['BID', '30856']
],
'Privileged' => false,
'Payload' =>

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2005-2847'],
['OSVDB', '19279'],
['BID', '14712'],
['URL', 'http://www.nessus.org/plugins/index.php?view=single&id=19556'],
['URL', 'http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1'],
['URL', 'http://www.nessus.org/plugins/index.php?view=single&id=19556']
],
'Privileged' => false,
'Payload' =>

View File

@ -21,8 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-14'],
['OSVDB', '69934'],
# ['CVE', ''],
# ['BID', '']

Some files were not shown because too many files have changed in this diff Show More