Fix current msftidy warnings about PACKETSTORM vs URL

bug/bundler_fix
Jon Hart 2015-12-24 09:05:02 -08:00
parent efdb6a8885
commit 27a6aa0be1
No known key found for this signature in database
GPG Key ID: 2FA9F0A3AFA8E9D3
14 changed files with 15 additions and 15 deletions

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'OSVDB', '90733' ],
[ 'BID', '58231' ],
[ 'URL', 'http://packetstormsecurity.com/files/120591/dlinkdir645-bypass.txt' ]
[ 'PACKETSTORM', '120591' ]
],
'Author' =>
[

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
['CVE', '2014-9707'],
['URL', 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html']
['PACKETSTORM', '131156']
],
'Author' =>
[

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
['EDB', '31262'],
['OSVDB', '102656'],
['BID', '65199'],
['URL', 'http://packetstormsecurity.com/files/124975/ManageEngine-Support-Center-Plus-7916-Directory-Traversal.html']
['PACKETSTORM', '124975']
],
'DisclosureDate' => "Jan 28 2014"
))

View File

@ -35,8 +35,8 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'EDB', '31683' ],
[ 'BID', '65585' ],
[ 'OSVDB', '103321' ],
[ 'URL', 'http://packetstormsecurity.com/files/125253/linksyseseries-exec.txt' ],
[ 'URL', 'http://packetstormsecurity.com/files/125252/Linksys-Worm-Remote-Root.html' ],
[ 'PACKETSTORM', '125253' ],
[ 'PACKETSTORM', '125252' ],
[ 'URL', 'https://isc.sans.edu/diary/Linksys+Worm+%22TheMoon%22+Summary%3A+What+we+know+so+far/17633' ],
[ 'URL', 'https://isc.sans.edu/forums/diary/Linksys+Worm+TheMoon+Captured/17630' ]
],

View File

@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'http://packetstormsecurity.com/files/125754/Loadbalancer.org-Enterprise-VA-7.5.2-Static-SSH-Key.html']
['PACKETSTORM', '125754']
],
'DisclosureDate' => "Mar 17 2014",
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'http://packetstormsecurity.com/files/125755/quantum-root.txt']
['PACKETSTORM', '125755']
],
'DisclosureDate' => "Mar 17 2014",
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['URL', 'http://packetstormsecurity.com/files/125760/quantumvmpro-backdoor.txt']
['PACKETSTORM', '125760']
],
'DefaultOptions' =>
{

View File

@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'CVE', '2013-2465' ],
[ 'OSVDB', '96269' ],
[ 'EDB', '27526' ],
[ 'URL', 'http://packetstormsecurity.com/files/122777/' ],
[ 'PACKETSTORM', '122777' ],
[ 'URL', 'http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040' ]
],
'Platform' => %w{ java linux win },

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
['OSVDB', '104652'],
['OSVDB', '104653'],
['OSVDB', '104654'],
['URL', 'http://packetstormsecurity.com/files/125761/Array-Networks-vxAG-xAPV-Privilege-Escalation.html']
['PACKETSTORM', '125761']
],
'DefaultOptions' =>
{

View File

@ -28,7 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'URL', 'http://packetstormsecurity.com/files/123480/ClipBucket-Remote-Code-Execution.html' ]
[ 'PACKETSTORM', '123480' ]
],
'Platform' => ['php'],
'Arch' => ARCH_PHP,

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'BID', '60816' ],
[ 'URL', 'http://packetstormsecurity.com/files/122176/InstantCMS-1.6-Code-Execution.html' ]
[ 'PACKETSTORM', '122176' ]
],
'Privileged' => false,
'Platform' => 'php',

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
['OSVDB', '102586'],
['BID', '65129'],
['EDB', '31183'],
['URL', 'http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html']
['PACKETSTORM', '124948']
],
'Privileged' => false,
'Payload' =>

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'URL', 'http://packetstormsecurity.com/files/122799/ZeroShell-2.0RC2-File-Disclosure-Command-Execution.html' ]
[ 'PACKETSTORM', '122799' ]
],
'Platform' => ['linux'],
'Arch' => ARCH_X86,

View File

@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '62793' ],
[ 'MSB', 'MS13-022' ],
[ 'MSB', 'MS13-087' ],
[ 'URL', 'http://packetstormsecurity.com/files/123731/' ]
[ 'PACKETSTORM', '123731' ]
],
'DefaultOptions' =>
{