Fix current msftidy warnings about PACKETSTORM vs URL
parent
efdb6a8885
commit
27a6aa0be1
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'OSVDB', '90733' ],
|
||||
[ 'BID', '58231' ],
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/120591/dlinkdir645-bypass.txt' ]
|
||||
[ 'PACKETSTORM', '120591' ]
|
||||
],
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2014-9707'],
|
||||
['URL', 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html']
|
||||
['PACKETSTORM', '131156']
|
||||
],
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
['EDB', '31262'],
|
||||
['OSVDB', '102656'],
|
||||
['BID', '65199'],
|
||||
['URL', 'http://packetstormsecurity.com/files/124975/ManageEngine-Support-Center-Plus-7916-Directory-Traversal.html']
|
||||
['PACKETSTORM', '124975']
|
||||
],
|
||||
'DisclosureDate' => "Jan 28 2014"
|
||||
))
|
||||
|
|
|
@ -35,8 +35,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'EDB', '31683' ],
|
||||
[ 'BID', '65585' ],
|
||||
[ 'OSVDB', '103321' ],
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/125253/linksyseseries-exec.txt' ],
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/125252/Linksys-Worm-Remote-Root.html' ],
|
||||
[ 'PACKETSTORM', '125253' ],
|
||||
[ 'PACKETSTORM', '125252' ],
|
||||
[ 'URL', 'https://isc.sans.edu/diary/Linksys+Worm+%22TheMoon%22+Summary%3A+What+we+know+so+far/17633' ],
|
||||
[ 'URL', 'https://isc.sans.edu/forums/diary/Linksys+Worm+TheMoon+Captured/17630' ]
|
||||
],
|
||||
|
|
|
@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://packetstormsecurity.com/files/125754/Loadbalancer.org-Enterprise-VA-7.5.2-Static-SSH-Key.html']
|
||||
['PACKETSTORM', '125754']
|
||||
],
|
||||
'DisclosureDate' => "Mar 17 2014",
|
||||
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },
|
||||
|
|
|
@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://packetstormsecurity.com/files/125755/quantum-root.txt']
|
||||
['PACKETSTORM', '125755']
|
||||
],
|
||||
'DisclosureDate' => "Mar 17 2014",
|
||||
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://packetstormsecurity.com/files/125760/quantumvmpro-backdoor.txt']
|
||||
['PACKETSTORM', '125760']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2013-2465' ],
|
||||
[ 'OSVDB', '96269' ],
|
||||
[ 'EDB', '27526' ],
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/122777/' ],
|
||||
[ 'PACKETSTORM', '122777' ],
|
||||
[ 'URL', 'http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040' ]
|
||||
],
|
||||
'Platform' => %w{ java linux win },
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '104652'],
|
||||
['OSVDB', '104653'],
|
||||
['OSVDB', '104654'],
|
||||
['URL', 'http://packetstormsecurity.com/files/125761/Array-Networks-vxAG-xAPV-Privilege-Escalation.html']
|
||||
['PACKETSTORM', '125761']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -28,7 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/123480/ClipBucket-Remote-Code-Execution.html' ]
|
||||
[ 'PACKETSTORM', '123480' ]
|
||||
],
|
||||
'Platform' => ['php'],
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'BID', '60816' ],
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/122176/InstantCMS-1.6-Code-Execution.html' ]
|
||||
[ 'PACKETSTORM', '122176' ]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => 'php',
|
||||
|
|
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '102586'],
|
||||
['BID', '65129'],
|
||||
['EDB', '31183'],
|
||||
['URL', 'http://packetstormsecurity.com/files/124948/SkyBlueCanvas-CMS-1.1-r248-03-Command-Injection.html']
|
||||
['PACKETSTORM', '124948']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/122799/ZeroShell-2.0RC2-File-Disclosure-Command-Execution.html' ]
|
||||
[ 'PACKETSTORM', '122799' ]
|
||||
],
|
||||
'Platform' => ['linux'],
|
||||
'Arch' => ARCH_X86,
|
||||
|
|
|
@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'BID', '62793' ],
|
||||
[ 'MSB', 'MS13-022' ],
|
||||
[ 'MSB', 'MS13-087' ],
|
||||
[ 'URL', 'http://packetstormsecurity.com/files/123731/' ]
|
||||
[ 'PACKETSTORM', '123731' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
Loading…
Reference in New Issue