diff --git a/modules/auxiliary/admin/cisco/ios_http_auth_bypass.rb b/modules/auxiliary/admin/cisco/ios_http_auth_bypass.rb index c8bb29873f..7b1b292eb9 100644 --- a/modules/auxiliary/admin/cisco/ios_http_auth_bypass.rb +++ b/modules/auxiliary/admin/cisco/ios_http_auth_bypass.rb @@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary [ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20010627-ios-http-level.shtml'], [ 'OSVDB', '578' ], ], - 'DisclosureDate' => 'June 27 2001')) + 'DisclosureDate' => 'Jun 27 2001')) register_options( [ diff --git a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb index 05e62e92cc..b58cb77659 100644 --- a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb +++ b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary 'Name' => 'Oracle URL Download', 'Description' => %q{ This module will create a java class which enables the download - of a binary from a webserver to the oracle filesystem. + of a binary from a webserver to the oracle filesystem. }, 'Author' => [ 'CG' ], 'License' => MSF_LICENSE, @@ -29,6 +29,7 @@ class Metasploit3 < Msf::Auxiliary [ [ 'URL', 'http://www.argeniss.com/research/oraclesqlinj.zip' ], ], + # Where did this date come from? -jjd 'DisclosureDate' => 'Feb 2003')) register_options( diff --git a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb index 66778c887b..f4c780afde 100644 --- a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb +++ b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb @@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary [ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20000514-ios-http-server.shtml'], [ 'OSVDB', '1302' ], ], - 'DisclosureDate' => 'April 26 2000')) + 'DisclosureDate' => 'Apr 26 2000')) register_options( [ diff --git a/modules/auxiliary/dos/wireshark/chunked.rb b/modules/auxiliary/dos/wireshark/chunked.rb index 26807a781b..afdde8005a 100644 --- a/modules/auxiliary/dos/wireshark/chunked.rb +++ b/modules/auxiliary/dos/wireshark/chunked.rb @@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary [ 'OSVDB', '37643'], [ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'], ], - 'DisclosureDate' => 'February 22 2007')) + 'DisclosureDate' => 'Feb 22 2007')) register_options([ OptInt.new('SPORT', [true, 'The source port used to send the malicious HTTP response', 80]), diff --git a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb index 28a5de66f5..e0be548218 100644 --- a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb @@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary [ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ], [ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ], ], - 'DisclosureDate' => 'Nov 11, 2008')) + 'DisclosureDate' => 'Oct 13 2008')) register_options( [ diff --git a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb index 37d3067a38..7d3e40325b 100644 --- a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb @@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary [ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ], ], - 'DisclosureDate' => 'Jan 2009')) + 'DisclosureDate' => 'Oct 13 2008')) register_options( [ diff --git a/modules/exploits/multi/browser/itms_overflow.rb b/modules/exploits/multi/browser/itms_overflow.rb index 8b2e465825..3c63ff386e 100644 --- a/modules/exploits/multi/browser/itms_overflow.rb +++ b/modules/exploits/multi/browser/itms_overflow.rb @@ -21,21 +21,21 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Apple OS X iTunes 8.1.1 ITMS Overflow', 'Description' => %q{ - This modules exploits a stack-based buffer overflow in iTunes + This modules exploits a stack-based buffer overflow in iTunes itms:// URL parsing. It is accessible from the browser and in Safari, itms urls will be opened in iTunes automatically. Because iTunes is multithreaded, only vfork-based payloads should be used. }, - 'Author' => [ 'Will Drewry ' ], + 'Author' => [ 'Will Drewry ' ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0950' ], - ['OSVDB', '54833'], - ['URL', 'http://support.apple.com/kb/HT3592'], - ['URL', 'http://redpig.dataspill.org/2009/05/drive-by-attack-for-itunes-811.html'], + [ 'OSVDB', '54833' ], + [ 'URL', 'http://support.apple.com/kb/HT3592' ], + [ 'URL', 'http://redpig.dataspill.org/2009/05/drive-by-attack-for-itunes-811.html' ] ], 'Payload' => { @@ -62,7 +62,7 @@ class Metasploit3 < Msf::Exploit::Remote }, ] ], - 'DisclosureDate' => 'June 1, 2009', + 'DisclosureDate' => 'Jun 01 2009', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/unix/webapp/joomla_tinybrowser.rb b/modules/exploits/unix/webapp/joomla_tinybrowser.rb index 765738defc..2fd70177e5 100644 --- a/modules/exploits/unix/webapp/joomla_tinybrowser.rb +++ b/modules/exploits/unix/webapp/joomla_tinybrowser.rb @@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Platform' => 'php', 'Arch' => ARCH_PHP, 'Targets' => [[ 'Automatic', { }]], - 'DisclosureDate' => 'July 22 2009', + 'DisclosureDate' => 'Jul 22 2009', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/unix/webapp/sphpblog_file_upload.rb b/modules/exploits/unix/webapp/sphpblog_file_upload.rb index 72f96084a3..bce2c73a7c 100644 --- a/modules/exploits/unix/webapp/sphpblog_file_upload.rb +++ b/modules/exploits/unix/webapp/sphpblog_file_upload.rb @@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Platform' => 'php', 'Arch' => ARCH_PHP, 'Targets' => [[ 'Automatic', { }]], - 'DisclosureDate' => 'August 25 2005', + 'DisclosureDate' => 'Aug 25 2005', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/brightstor/universal_agent.rb b/modules/exploits/windows/brightstor/universal_agent.rb index cf2f12e345..d2904279ef 100644 --- a/modules/exploits/windows/brightstor/universal_agent.rb +++ b/modules/exploits/windows/brightstor/universal_agent.rb @@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote }, ], ], - 'DisclosureDate' => '', + 'DisclosureDate' => 'Apr 11 2005', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/browser/adobe_jbig2decode.rb b/modules/exploits/windows/browser/adobe_jbig2decode.rb index cfa09c63e8..f44e55d3ba 100644 --- a/modules/exploits/windows/browser/adobe_jbig2decode.rb +++ b/modules/exploits/windows/browser/adobe_jbig2decode.rb @@ -56,7 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Adobe Reader v9.0.0 (Windows XP SP3 English)', { 'Ret' => 0x0166B550 } ], # Ret * 5 == 0x07018A90 (BIB.dll) [ 'Adobe Reader v8.1.2 (Windows XP SP2 English)', { 'Ret' => 0x9B004870 } ], # Ret * 5 == 0x07017A30 (BIB.dll) ], - 'DisclosureDate' => 'Feb 2009', + 'DisclosureDate' => 'Feb 19 2009', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/aol_icq_downloadagent.rb b/modules/exploits/windows/browser/aol_icq_downloadagent.rb index 19a0f3eeb0..72999b28cb 100644 --- a/modules/exploits/windows/browser/aol_icq_downloadagent.rb +++ b/modules/exploits/windows/browser/aol_icq_downloadagent.rb @@ -29,8 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'CVE', '2006-5650' ], - [ 'OSVDB', '30220'], - [ 'BID', '20930' ], + [ 'OSVDB', '30220' ], + [ 'BID', '20930' ], [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-06-037/' ], ], 'Payload' => @@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Automatic', { } ], ], - 'DisclosureDate' => 'Nov 6, 2006', + 'DisclosureDate' => 'Nov 06 2006', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb b/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb index 135432435b..21de12922f 100644 --- a/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb +++ b/modules/exploits/windows/browser/awingsoft_winds3d_sceneurl.rb @@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Automatic', { }], ], - # 'DisclosureDate' => 'Mmm DD 2009', + 'DisclosureDate' => 'Nov 14 2009', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb b/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb index 1424ac21d1..5879e2ac03 100644 --- a/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb +++ b/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb @@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Windows XP SP2-SP3 IE 6.0/7.0', { 'Ret' => 0x0A0A0A0A } ] ], - 'DisclosureDate' => 'March 16 2008', + 'DisclosureDate' => 'Mar 16 2008', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb b/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb index 344072ad35..4407597d73 100644 --- a/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb +++ b/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb @@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote # Tested ok patrickw 20090303 [ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0A0A0A0A } ], ], - 'DisclosureDate' => 'June 6 2007', + 'DisclosureDate' => 'Jun 6 2007', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb b/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb index be31221b44..4070135d04 100644 --- a/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb +++ b/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows 2000 Pro English All', { 'Ret' => 0x75022ac4 } ], ], - 'DisclosureDate' => 'July 05 2007', + 'DisclosureDate' => 'Jul 05 2007', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb b/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb index b2f4863e61..a4a863d6d3 100644 --- a/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb +++ b/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb @@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Windows XP Pro SP2 English', { 'Offset' => 483, 'Ret' => 0x7c941eed } ], ], - 'DisclosureDate' => 'July 7 2007', + 'DisclosureDate' => 'Jul 7 2007', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/ms10_xxx_helpctr_xss_cmd_exec.rb b/modules/exploits/windows/browser/ms10_xxx_helpctr_xss_cmd_exec.rb index be0c5b4a41..1990873f2b 100644 --- a/modules/exploits/windows/browser/ms10_xxx_helpctr_xss_cmd_exec.rb +++ b/modules/exploits/windows/browser/ms10_xxx_helpctr_xss_cmd_exec.rb @@ -66,7 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Automatic', { } ] ], - 'DisclosureDate' => 'June 09, 2010', + 'DisclosureDate' => 'Jun 09 2010', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/browser/novelliprint_getdriversettings.rb b/modules/exploits/windows/browser/novelliprint_getdriversettings.rb index 221e6a9490..3336ce383a 100644 --- a/modules/exploits/windows/browser/novelliprint_getdriversettings.rb +++ b/modules/exploits/windows/browser/novelliprint_getdriversettings.rb @@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0A0A0A0A } ] ], - 'DisclosureDate' => 'June 16 2008', + 'DisclosureDate' => 'Jun 16 2008', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/realplayer_console.rb b/modules/exploits/windows/browser/realplayer_console.rb index ad7226c4f0..320e61c8b4 100644 --- a/modules/exploits/windows/browser/realplayer_console.rb +++ b/modules/exploits/windows/browser/realplayer_console.rb @@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Windows XP SP0-SP3 / IE 6.0 SP0-2 & IE 7.0 English', { 'Offset' => 32, 'Ret' => 0x0C0C0C0C } ] ], - 'DisclosureDate' => 'March 8 2008', + 'DisclosureDate' => 'Mar 8 2008', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb b/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb index 132046f4be..9f147a76f9 100644 --- a/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb +++ b/modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb @@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Automatic', { } ], ], - 'DisclosureDate' => 'Sep 7, 2009', + 'DisclosureDate' => 'Sep 07 2009', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb index d8099376a6..495d9a62d6 100644 --- a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb +++ b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb @@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Automatic', { } ], ], - 'DisclosureDate' => 'Jan 15, 2009', + 'DisclosureDate' => 'Jan 15 2009', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/tumbleweed_filetransfer.rb b/modules/exploits/windows/browser/tumbleweed_filetransfer.rb index 38d740aac9..311b6119d3 100644 --- a/modules/exploits/windows/browser/tumbleweed_filetransfer.rb +++ b/modules/exploits/windows/browser/tumbleweed_filetransfer.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Tumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow', 'Description' => %q{ - This module exploits a stack buffer overflow in the vcst_eu.dll + This module exploits a stack buffer overflow in the vcst_eu.dll FileTransfer Module (1.0.0.5) ActiveX control in the Tumbleweed SecureTransport suite. By sending an overly long string to the TransferFile() 'remotefile' function, an attacker may be able @@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Version' => '$Revision$', 'References' => [ - [ 'CVE', '2008-1724'], - [ 'OSVDB', '44252'], - [ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ], + [ 'CVE', '2008-1724' ], + [ 'OSVDB', '44252' ], + [ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ] ], 'DefaultOptions' => { @@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows 2000 Pro English', { 'Ret' => 0x75022ac4 } ], [ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ], ], - 'DisclosureDate' => '07 Apr 2008', + 'DisclosureDate' => 'Apr 07 2008', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/verypdf_pdfview.rb b/modules/exploits/windows/browser/verypdf_pdfview.rb index 0740c5c719..d904667b76 100644 --- a/modules/exploits/windows/browser/verypdf_pdfview.rb +++ b/modules/exploits/windows/browser/verypdf_pdfview.rb @@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0c0c0c0c } ] ], - 'DisclosureDate' => 'June 16 2008', + 'DisclosureDate' => 'Jun 16 2008', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/yahoomessenger_server.rb b/modules/exploits/windows/browser/yahoomessenger_server.rb index 3f826e5fb5..f0dc786849 100644 --- a/modules/exploits/windows/browser/yahoomessenger_server.rb +++ b/modules/exploits/windows/browser/yahoomessenger_server.rb @@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows XP SP0/SP1 Pro English', { 'Offset' => 1032, 'Ret' => 0x71aa32ad } ], [ 'Windows 2000 Pro English All', { 'Offset' => 1032, 'Ret' => 0x75022ac4 } ] ], - 'DisclosureDate' => 'June 5 2007', + 'DisclosureDate' => 'Jun 5 2007', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb index 0a42afa2d9..410c2edafb 100644 --- a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb +++ b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'Automatic', { } ], ], - 'DisclosureDate' => 'May 29, 2007', + 'DisclosureDate' => 'May 29 2007', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb index bce0fa72a2..452ea85910 100644 --- a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb +++ b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb @@ -26,14 +26,14 @@ class Metasploit3 < Msf::Exploit::Remote }, 'License' => MSF_LICENSE, 'Author' => - [ + [ # Metasploit implementation 'natron', # bl4cksecurity blog explanation of vuln [see References] 'xort', 'redsand', # obfuscation techniques and pdf template from util_printf 'MC', 'Didier Stevens ', - ], + ], 'Version' => '$Revision$', 'References' => [ @@ -56,7 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Adobe Reader v9.0.0 (Windows XP SP3 English)', { 'Ret' => 0x0166B550 } ], # Ret * 5 == 0x07018A90 (BIB.dll) [ 'Adobe Reader v8.1.2 (Windows XP SP2 English)', { 'Ret' => 0x9B004870 } ], # Ret * 5 == 0x07017A30 (BIB.dll) ], - 'DisclosureDate' => 'Feb 2009', + 'DisclosureDate' => 'Feb 19 2009', 'DefaultTarget' => 0)) register_options([ diff --git a/modules/exploits/windows/fileformat/fdm_torrent.rb b/modules/exploits/windows/fileformat/fdm_torrent.rb index 853c1939a0..a749608c72 100644 --- a/modules/exploits/windows/fileformat/fdm_torrent.rb +++ b/modules/exploits/windows/fileformat/fdm_torrent.rb @@ -63,7 +63,7 @@ class Metasploit3 < Msf::Exploit::Remote ], ], 'Privileged' => false, - 'DisclosureDate' => 'February 2 2009', + 'DisclosureDate' => 'Feb 2 2009', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/fileformat/mymp3player_m3u.rb b/modules/exploits/windows/fileformat/mymp3player_m3u.rb index 6624a4014d..e494161ad9 100644 --- a/modules/exploits/windows/fileformat/mymp3player_m3u.rb +++ b/modules/exploits/windows/fileformat/mymp3player_m3u.rb @@ -55,7 +55,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows XP SP3 French', { 'Ret' => 0x72c6170b } ], # seh return in msacm.drv ], 'Privileged' => false, - 'DisclosureDate' => 'March 18 2010', + 'DisclosureDate' => 'Mar 18 2010', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb b/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb index cd084ce29e..9b84eb9977 100644 --- a/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb +++ b/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Zinf Universal 2.2.1', { 'Ret' => 0x1204f514 } ], #pop esi; pop ebx; ret - ./Plugins/zinf.ui ], 'Privileged' => false, - 'DisclosureDate' => '24 Sep 2004', + 'DisclosureDate' => 'Sep 24 2004', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/firewall/kerio_auth.rb b/modules/exploits/windows/firewall/kerio_auth.rb index ea6c7f4ad7..b635759866 100644 --- a/modules/exploits/windows/firewall/kerio_auth.rb +++ b/modules/exploits/windows/firewall/kerio_auth.rb @@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows XP Pro SP1 English', { 'Ret' => 0x77dc5527 } ], ], 'Privileged' => true, - 'DisclosureDate' => 'April 28 2003', + 'DisclosureDate' => 'Apr 28 2003', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/ftp/trellian_client_pasv.rb b/modules/exploits/windows/ftp/trellian_client_pasv.rb index 28b7b94859..e455d6312a 100644 --- a/modules/exploits/windows/ftp/trellian_client_pasv.rb +++ b/modules/exploits/windows/ftp/trellian_client_pasv.rb @@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows XP Universal', { 'Ret' => "\xfd\x21\x40" } ], # 0x004021fd p/p/r in ftp.exe ], 'Privileged' => false, - 'DisclosureDate' => 'April 11 2010', + 'DisclosureDate' => 'Apr 11 2010', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/http/sapdb_webtools.rb b/modules/exploits/windows/http/sapdb_webtools.rb index f45c73c000..d37aa5a47b 100644 --- a/modules/exploits/windows/http/sapdb_webtools.rb +++ b/modules/exploits/windows/http/sapdb_webtools.rb @@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'SAP DB 7.4 WebTools', { 'Ret' => 0x1003c95a } ], # wapi.dll 7.4.3.0 ], - 'DisclosureDate' => 'July 5 2007', + 'DisclosureDate' => 'Jul 5 2007', 'DefaultTarget' => 0)) register_options( [ Opt::RPORT(9999) ], self.class ) diff --git a/modules/exploits/windows/iis/ms01_033_idq.rb b/modules/exploits/windows/iis/ms01_033_idq.rb index dc1932d814..e2d77a025f 100644 --- a/modules/exploits/windows/iis/ms01_033_idq.rb +++ b/modules/exploits/windows/iis/ms01_033_idq.rb @@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows 2000 Pro English SP0', { 'Ret' => '0x6e8f3e24' } ], [ 'Windows 2000 Pro English SP1-SP2', { 'Ret' => '0x6e8f8cc4' } ], ], - 'DisclosureDate' => 'June 18 2001', + 'DisclosureDate' => 'Jun 18 2001', 'DefaultTarget' => 0)) register_options([Opt::RPORT(80)], self.class) diff --git a/modules/exploits/windows/imap/ipswitch_search.rb b/modules/exploits/windows/imap/ipswitch_search.rb index c5e1d314f9..56a579d768 100644 --- a/modules/exploits/windows/imap/ipswitch_search.rb +++ b/modules/exploits/windows/imap/ipswitch_search.rb @@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows 2003 SP0 English', { 'Ret' => 0x77c5cee8 } ] ], 'DefaultTarget' => 0, - 'DisclosureDate' => 'July 18 2007')) + 'DisclosureDate' => 'Jul 18 2007')) end def exploit diff --git a/modules/exploits/windows/imap/mailenable_w3c_select.rb b/modules/exploits/windows/imap/mailenable_w3c_select.rb index e367643548..403ed79821 100644 --- a/modules/exploits/windows/imap/mailenable_w3c_select.rb +++ b/modules/exploits/windows/imap/mailenable_w3c_select.rb @@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote [ ['MailEnable 1.54 Pro Universal', { 'Ret' => 0x1001c019 } ] #MEAISP.DLL ], - 'DisclosureDate' => '', + 'DisclosureDate' => 'Oct 03 2005', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/imap/mdaemon_fetch.rb b/modules/exploits/windows/imap/mdaemon_fetch.rb index 2cc39d1dbb..7d4b94dba3 100644 --- a/modules/exploits/windows/imap/mdaemon_fetch.rb +++ b/modules/exploits/windows/imap/mdaemon_fetch.rb @@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'MDaemon Version 9.6.4', { 'Ret' => 0x64dc118b } ], # p/p/r HashCash.dll ], - 'DisclosureDate' => 'March 13 2008', + 'DisclosureDate' => 'Mar 13 2008', 'DefaultTarget' => 0)) end diff --git a/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb b/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb index 124115622e..b641c88bec 100644 --- a/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb +++ b/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb @@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Privileged' => true, 'DefaultTarget' => 0, - 'DisclosureDate' => 'March 21 2008')) + 'DisclosureDate' => 'Mar 21 2008')) register_options([Opt::RPORT(623)], self.class) diff --git a/modules/exploits/windows/misc/borland_interbase.rb b/modules/exploits/windows/misc/borland_interbase.rb index 5ff3e79f77..5499cb1012 100644 --- a/modules/exploits/windows/misc/borland_interbase.rb +++ b/modules/exploits/windows/misc/borland_interbase.rb @@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Privileged' => true, 'DefaultTarget' => 0, - 'DisclosureDate' => 'July 24 2007')) + 'DisclosureDate' => 'Jul 24 2007')) register_options([Opt::RPORT(3050)], self.class) end diff --git a/modules/exploits/windows/misc/borland_starteam.rb b/modules/exploits/windows/misc/borland_starteam.rb index bef400e78c..378f882212 100644 --- a/modules/exploits/windows/misc/borland_starteam.rb +++ b/modules/exploits/windows/misc/borland_starteam.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote ], 'Privileged' => true, 'DefaultTarget' => 0, - 'DisclosureDate' => 'Apr 2, 2008')) + 'DisclosureDate' => 'Apr 02 2008')) register_options([Opt::RPORT(3057)], self.class) end diff --git a/modules/exploits/windows/misc/eiqnetworks_esa.rb b/modules/exploits/windows/misc/eiqnetworks_esa.rb index c5a69aba4f..720379aa65 100644 --- a/modules/exploits/windows/misc/eiqnetworks_esa.rb +++ b/modules/exploits/windows/misc/eiqnetworks_esa.rb @@ -73,7 +73,7 @@ class Metasploit3 < Msf::Exploit::Remote ['Top Layer Network Security Analyzer (OEM) Offset 1262 Windows Server 2003 English SP0/SP1', { 'Ret' => 0x77d16764, 'Offset' => 1262 } ], ], 'Privileged' => false, - 'DisclosureDate' => 'July 24 2006' + 'DisclosureDate' => 'Jul 24 2006' )) register_options( diff --git a/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb b/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb index df81ba369f..e97e472f3c 100644 --- a/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb +++ b/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb @@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows 2003 SP1 English', { 'Ret' => 0x773b24da } ], ], 'Privileged' => false, - 'DisclosureDate' => 'July 25 2006' + 'DisclosureDate' => 'Jul 25 2006' )) register_options( diff --git a/modules/exploits/windows/misc/mercury_phonebook.rb b/modules/exploits/windows/misc/mercury_phonebook.rb index 9e2fcd120a..4003e4f86e 100644 --- a/modules/exploits/windows/misc/mercury_phonebook.rb +++ b/modules/exploits/windows/misc/mercury_phonebook.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows 2000 Pro English ALL', { 'Ret' => 0x75022ac4 } ], ], 'Privileged' => true, - 'DisclosureDate' => 'December 19 2005', + 'DisclosureDate' => 'Dec 19 2005', 'DefaultTarget' => 0)) register_options([ Opt::RPORT(105)], self) diff --git a/modules/exploits/windows/misc/shixxnote_font.rb b/modules/exploits/windows/misc/shixxnote_font.rb index 44a95c7c8b..273503152a 100644 --- a/modules/exploits/windows/misc/shixxnote_font.rb +++ b/modules/exploits/windows/misc/shixxnote_font.rb @@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Privileged' => false, - 'DisclosureDate' => 'October 4 2004', + 'DisclosureDate' => 'Oct 4 2004', 'DefaultTarget' => 0)) diff --git a/modules/exploits/windows/novell/groupwisemessenger_client.rb b/modules/exploits/windows/novell/groupwisemessenger_client.rb index 34fc13f571..56a6661bf4 100644 --- a/modules/exploits/windows/novell/groupwisemessenger_client.rb +++ b/modules/exploits/windows/novell/groupwisemessenger_client.rb @@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Novell GroupWise Messenger 1.0 Client', { 'Ret' => 0x1000e105 } ], ], 'Privileged' => false, - 'DisclosureDate' => 'July 2 2008', + 'DisclosureDate' => 'Jul 2 2008', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb b/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb index 0d042f36f4..80ddf886fa 100644 --- a/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb +++ b/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'WinProxy <= 6.1 R1a Universal', { 'Ret' => 0x6020ba04 } ], # Asmdat.dll ], 'Privileged' => true, - 'DisclosureDate' => 'January 5 2005', + 'DisclosureDate' => 'Jan 5 2005', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/sip/aim_triton_cseq.rb b/modules/exploits/windows/sip/aim_triton_cseq.rb index 91568b00f6..95b344b005 100644 --- a/modules/exploits/windows/sip/aim_triton_cseq.rb +++ b/modules/exploits/windows/sip/aim_triton_cseq.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'AIM Triton 1.0.4 Universal', { 'Ret' => 0x4017b3d9 } ], # coolcore45.dll ], 'Privileged' => false, - 'DisclosureDate' => 'July 10 2006', + 'DisclosureDate' => 'Jul 10 2006', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/sip/sipxezphone_cseq.rb b/modules/exploits/windows/sip/sipxezphone_cseq.rb index 2457b14cc6..30f34bd5ea 100644 --- a/modules/exploits/windows/sip/sipxezphone_cseq.rb +++ b/modules/exploits/windows/sip/sipxezphone_cseq.rb @@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Privileged' => false, - 'DisclosureDate' => 'July 10 2006', + 'DisclosureDate' => 'Jul 10 2006', 'DefaultTarget' => 0)) diff --git a/modules/exploits/windows/sip/sipxphone_cseq.rb b/modules/exploits/windows/sip/sipxphone_cseq.rb index f11d58e606..b82d74dce3 100644 --- a/modules/exploits/windows/sip/sipxphone_cseq.rb +++ b/modules/exploits/windows/sip/sipxphone_cseq.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'SIPfoundry sipXphone 2.6.0.27 Universal', { 'Ret' => 0x08016aac } ], ], 'Privileged' => false, - 'DisclosureDate' => 'July 10 2006', + 'DisclosureDate' => 'Jul 10 2006', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/ssh/putty_msg_debug.rb b/modules/exploits/windows/ssh/putty_msg_debug.rb index f1c05d3137..bedafc4366 100644 --- a/modules/exploits/windows/ssh/putty_msg_debug.rb +++ b/modules/exploits/windows/ssh/putty_msg_debug.rb @@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'Windows 2003 SP1 English', { 'Ret' => 0x76aa679b } ], ], 'Privileged' => false, - 'DisclosureDate' => 'December 16 2002', + 'DisclosureDate' => 'Dec 16 2002', 'DefaultTarget' => 0)) register_options( diff --git a/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb b/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb index 2c553c5962..47ca9b6dd6 100644 --- a/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb +++ b/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb @@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote ['Windows XP SP2', {'Ret' => 0x74D31458} ], #oledlg.dll ], 'DefaultTarget' => 1, - 'DisclosureDate' => 'March 27 2008')) + 'DisclosureDate' => 'Mar 27 2008')) register_options( [ diff --git a/modules/exploits/windows/unicenter/cam_log_security.rb b/modules/exploits/windows/unicenter/cam_log_security.rb index 5049d6c441..989accd484 100644 --- a/modules/exploits/windows/unicenter/cam_log_security.rb +++ b/modules/exploits/windows/unicenter/cam_log_security.rb @@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote ['Windows XP SP2 English', { 'Platform' => 'win', 'Ret' => 0x71aa1b22 }], ['Windows 2003 SP0 English', { 'Platform' => 'win', 'Ret' => 0x71bf175f }], ], - 'DisclosureDate' => '', + 'DisclosureDate' => 'Aug 22 2005', 'DefaultTarget' => 0)) end diff --git a/tools/msfcrawler.rb b/tools/msfcrawler.rb index 4ddf55e1a1..e43a0e9f18 100755 --- a/tools/msfcrawler.rb +++ b/tools/msfcrawler.rb @@ -363,7 +363,7 @@ class HttpCrawler hashreq['uri'] = canonicalize(hashreq['uri']) if hashreq['rhost'] == self.ctarget and hashreq['rport'] == self.cport - if !@ViewedQueue.include?(hashsig(hashreq)) + if !@ViewedQueue.include?(hashsig(hashreq)) if @NotViewedQueue.read_all(hashreq).size > 0 if $verbose puts "Already in queue to be viewed: #{hashreq['uri']}" @@ -393,7 +393,7 @@ class HttpCrawler # basepath: base path/uri to determine absolute path when relative # data: body data, nil if GET and query = uri.query - + uri = URI.parse(url) uritargetssl = (uri.scheme == "https") ? true : false