From d2885d90456f3385cc842c7529f1109cc8c11be4 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Thu, 13 Dec 2012 14:19:53 -0600 Subject: [PATCH] Correct US Cert references --- .../auxiliary/admin/vxworks/apple_airport_extreme_password.rb | 2 +- modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb | 2 +- modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb | 2 +- modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb | 2 +- modules/auxiliary/scanner/telnet/telnet_ruggedcom.rb | 2 +- modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb | 2 +- modules/auxiliary/scanner/vxworks/wdbrpc_version.rb | 2 +- modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb | 2 +- modules/exploits/windows/ftp/scriptftp_list.rb | 2 +- 9 files changed, 9 insertions(+), 9 deletions(-) diff --git a/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb b/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb index 16d52a9e09..c951f00f91 100644 --- a/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb +++ b/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb @@ -35,7 +35,7 @@ class Metasploit3 < Msf::Auxiliary [ ['OSVDB', '66842'], ['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'], - ['URL', 'http://www.kb.cert.org/vuls/id/362332'] + ['US-CERT-VU', '362332'] ] )) end diff --git a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb index f3993482c3..50bf6540ce 100644 --- a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb +++ b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb @@ -35,7 +35,7 @@ class Metasploit3 < Msf::Auxiliary [ ['OSVDB', '66842'], ['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'], - ['URL', 'http://www.kb.cert.org/vuls/id/362332'] + ['US-CERT-VU', '362332'] ] )) end diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb index 3b9cdaf6ac..061bec32f2 100644 --- a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb +++ b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb @@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary [ ['OSVDB', '66842'], ['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'], - ['URL', 'http://www.kb.cert.org/vuls/id/362332'] + ['US-CERT-VU', '362332'] ], 'Actions' => [ diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb index edc107414d..2168cc872e 100644 --- a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb +++ b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb @@ -32,7 +32,7 @@ class Metasploit3 < Msf::Auxiliary [ ['OSVDB', '66842'], ['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'], - ['URL', 'http://www.kb.cert.org/vuls/id/362332'] + ['US-CERT-VU', '362332'] ], 'Actions' => [ diff --git a/modules/auxiliary/scanner/telnet/telnet_ruggedcom.rb b/modules/auxiliary/scanner/telnet/telnet_ruggedcom.rb index d474f71589..447fdd83f5 100644 --- a/modules/auxiliary/scanner/telnet/telnet_ruggedcom.rb +++ b/modules/auxiliary/scanner/telnet/telnet_ruggedcom.rb @@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary [ [ 'CVE', '2012-1803' ], [ 'EDB', '18779' ], - [ 'URL', 'http://www.kb.cert.org/vuls/id/889195' ] + [ 'US-CERT-VU', '889195' ] ], 'Author' => [ 'Borja Merino ', diff --git a/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb b/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb index 77a577276a..7f57f34724 100644 --- a/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb +++ b/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb @@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ ['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'], - ['URL', 'http://www.kb.cert.org/vuls/id/362332'] + ['US-CERT-VU', '362332'] ] ) diff --git a/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb b/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb index b604e69ded..d8d9dbc8c9 100644 --- a/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb +++ b/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb @@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ ['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'], - ['URL', 'http://www.kb.cert.org/vuls/id/362332'] + ['US-CERT-VU', '362332'] ] ) diff --git a/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb b/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb index e20f435c92..235ec4fbd8 100644 --- a/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb +++ b/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb @@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote ['BID', '50997'], ['OSVDB', '77600'], ['UDB', '18220'], - ['URL', 'http://www.kb.cert.org/vuls/id/158003'] + ['US-CERT-VU', '158003'] ], 'DefaultOptions' => { diff --git a/modules/exploits/windows/ftp/scriptftp_list.rb b/modules/exploits/windows/ftp/scriptftp_list.rb index 479edaad23..92075a4c6f 100644 --- a/modules/exploits/windows/ftp/scriptftp_list.rb +++ b/modules/exploits/windows/ftp/scriptftp_list.rb @@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'CVE', '2011-3976' ], [ 'OSVDB', '75633' ], [ 'EDB', '17876' ], - [ 'URL', 'http://www.kb.cert.org/vuls/id/440219' ], + [ 'US-CERT-VU', '440219' ] ], 'DefaultOptions' => {