From 5b18a34ad49e2155059388926c88c35807d2531f Mon Sep 17 00:00:00 2001 From: Michael Schierl Date: Mon, 22 Oct 2012 22:34:47 +0200 Subject: [PATCH] References cleanup Uppercase MSB, spaces in URLs. --- modules/exploits/windows/fileformat/ms12_005.rb | 2 +- modules/exploits/windows/iis/ms02_065_msadc.rb | 2 +- modules/exploits/windows/iis/msadc.rb | 4 ++-- modules/exploits/windows/local/bypassuac.rb | 2 +- modules/post/windows/escalate/bypassuac.rb | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/modules/exploits/windows/fileformat/ms12_005.rb b/modules/exploits/windows/fileformat/ms12_005.rb index 6364632d08..4cbfa12ec1 100644 --- a/modules/exploits/windows/fileformat/ms12_005.rb +++ b/modules/exploits/windows/fileformat/ms12_005.rb @@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote [ ['CVE', '2012-0013'], ['OSVDB', '78207'], - ['MSB', 'ms12-005'], + ['MSB', 'MS12-005'], ['BID', '51284'], ['URL', 'http://support.microsoft.com/default.aspx?scid=kb;EN-US;2584146'], ['URL', 'http://exploitshop.wordpress.com/2012/01/14/ms12-005-embedded-object-package-allow-arbitrary-code-execution/'] diff --git a/modules/exploits/windows/iis/ms02_065_msadc.rb b/modules/exploits/windows/iis/ms02_065_msadc.rb index 435fd68ec0..ce315ae0a8 100644 --- a/modules/exploits/windows/iis/ms02_065_msadc.rb +++ b/modules/exploits/windows/iis/ms02_065_msadc.rb @@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote ['OSVDB', '14502'], ['BID', '6214'], ['CVE', '2002-1142'], - ['MSB', 'ms02-065'], + ['MSB', 'MS02-065'], ['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html'] ], 'Privileged' => false, diff --git a/modules/exploits/windows/iis/msadc.rb b/modules/exploits/windows/iis/msadc.rb index 4cdb4be539..5f5c6ab8c1 100644 --- a/modules/exploits/windows/iis/msadc.rb +++ b/modules/exploits/windows/iis/msadc.rb @@ -42,8 +42,8 @@ class Metasploit3 < Msf::Exploit::Remote ['OSVDB', '272'], ['BID', '529'], ['CVE', '1999-1011'], - ['MSB', 'ms98-004'], - ['MSB', 'ms99-025'] + ['MSB', 'MS98-004'], + ['MSB', 'MS99-025'] ], 'Targets' => [ diff --git a/modules/exploits/windows/local/bypassuac.rb b/modules/exploits/windows/local/bypassuac.rb index 3788b2c7ee..983600d305 100644 --- a/modules/exploits/windows/local/bypassuac.rb +++ b/modules/exploits/windows/local/bypassuac.rb @@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Local 'Targets' => [ [ 'Windows', {} ] ], 'DefaultTarget' => 0, 'References' => [ - [ 'URL', ' http://www.trustedsec.com/december-2010/bypass-windows-uac/' ] + [ 'URL', 'http://www.trustedsec.com/december-2010/bypass-windows-uac/' ] ], 'DisclosureDate'=> "Dec 31 2010" )) diff --git a/modules/post/windows/escalate/bypassuac.rb b/modules/post/windows/escalate/bypassuac.rb index 06ef199e58..9c88439bc4 100644 --- a/modules/post/windows/escalate/bypassuac.rb +++ b/modules/post/windows/escalate/bypassuac.rb @@ -28,7 +28,7 @@ class Metasploit3 < Msf::Post 'Platform' => [ 'windows' ], 'SessionTypes' => [ 'meterpreter' ], 'References' => [ - [ 'URL', ' http://www.trustedsec.com/december-2010/bypass-windows-uac/' ] + [ 'URL', 'http://www.trustedsec.com/december-2010/bypass-windows-uac/' ] ], 'DisclosureDate'=> "Dec 31 2010" ))