1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00

Land #6812, remove broken OSVDB references

This commit is contained in:
Brent Cook 2016-07-11 22:59:11 -05:00
commit 2b016e0216
No known key found for this signature in database
GPG Key ID: 1FFAA0B24B708F96
1543 changed files with 35 additions and 1687 deletions

View File

@ -1,4 +1,4 @@
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
# Compiled by RSnake 02/01/2010 Mostly from milw0rm and elsewhere.
# Change XXpathXX to the path of your backdoor. Note that you may need to
# try it against every directory on the target and because of how this was
# culled you may need to add a question mark to your own XXpathXX URL:

View File

@ -40,16 +40,6 @@ module Msf::DBManager::Import::Nikto
}
# Always report it as a note.
report_note(desc_data)
# Sometimes report it as a vuln, too.
# XXX: There's a Vuln.info field but nothing reads from it? See Bug #5837
if item.attributes['osvdbid'].to_i != 0
desc_data[:refs] = ["OSVDB-#{item.attributes['osvdbid']}"]
desc_data[:name] = "NIKTO-#{item.attributes['id']}"
desc_data.delete(:data)
desc_data.delete(:type)
desc_data.delete(:update)
report_vuln(desc_data)
end
end
end
end

View File

@ -182,7 +182,6 @@ module Msf::DBManager::Import::Nmap
:info => 'Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution',
:refs =>['CVE-2008-4250',
'BID-31874',
'OSVDB-49243',
'CWE-94',
'MSFT-MS08-067',
'MSF-Microsoft Server Service Relative Path Stack Corruption',
@ -204,8 +203,6 @@ module Msf::DBManager::Import::Nmap
'BID-18325',
'BID-18358',
'BID-18424',
'OSVDB-26436',
'OSVDB-26437',
'MSFT-MS06-025',
'MSF-Microsoft RRAS Service RASMAN Registry Overflow',
'NSS-21689']
@ -224,7 +221,6 @@ module Msf::DBManager::Import::Nmap
:info => 'Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution',
# Add more refs based on nessus/nexpose .. results
:refs =>['CVE-2007-1748',
'OSVDB-34100',
'MSF-Microsoft DNS RPC Service extractQuotedChar()',
'NSS-25168']
}

View File

@ -158,7 +158,6 @@ module Msf::DBManager::ModuleCache
# +edb+:: Matches modules with the given Exploit-DB ID.
# +name+:: Matches modules with the given full name or name.
# +os+, +platform+:: Matches modules with the given platform or target name.
# +osvdb+:: Matches modules with the given OSVDB ID.
# +ref+:: Matches modules with the given reference ID.
# +type+:: Matches modules with the given type.
#
@ -277,7 +276,7 @@ module Msf::DBManager::ModuleCache
query = query.includes(:refs).references(:refs)
union_conditions << Mdm::Module::Ref.arel_table[:name].matches_any(formatted_values)
when 'cve', 'bid', 'osvdb', 'edb'
when 'cve', 'bid', 'edb'
formatted_values = value_set.collect { |value|
prefix = keyword.upcase

View File

@ -77,7 +77,7 @@ class Msf::Module::SiteReference < Msf::Module::Reference
#
# Initializes a site reference from an array. ary[0] is the site and
# ary[1] is the site context identifier, such as OSVDB.
# ary[1] is the site context identifier, such as CVE.
#
def self.from_a(ary)
return nil if (ary.length < 2)
@ -95,9 +95,7 @@ class Msf::Module::SiteReference < Msf::Module::Reference
self.ctx_id = in_ctx_id
self.ctx_val = in_ctx_val
if (in_ctx_id == 'OSVDB')
self.site = "http://www.osvdb.org/#{in_ctx_val}"
elsif (in_ctx_id == 'CVE')
if (in_ctx_id == 'CVE')
self.site = "http://cvedetails.com/cve/#{in_ctx_val}/"
elsif (in_ctx_id == 'CWE')
self.site = "https://cwe.mitre.org/data/definitions/#{in_ctx_val}.html"
@ -150,7 +148,7 @@ class Msf::Module::SiteReference < Msf::Module::Reference
#
attr_reader :site
#
# The context identifier of the site, such as OSVDB.
# The context identifier of the site, such as CVE.
#
attr_reader :ctx_id
#

View File

@ -86,8 +86,6 @@ module Msf::Module::Search
match = [t,w] if refs.any? { |ref| ref =~ /^cve\-/i and ref =~ r }
when 'bid'
match = [t,w] if refs.any? { |ref| ref =~ /^bid\-/i and ref =~ r }
when 'osvdb'
match = [t,w] if refs.any? { |ref| ref =~ /^osvdb\-/i and ref =~ r }
when 'edb'
match = [t,w] if refs.any? { |ref| ref =~ /^edb\-/i and ref =~ r }
end

View File

@ -1615,7 +1615,6 @@ class Core
'cve' => 'Modules with a matching CVE ID',
'edb' => 'Modules with a matching Exploit-DB ID',
'name' => 'Modules with a matching descriptive name',
'osvdb' => 'Modules with a matching OSVDB ID',
'platform' => 'Modules affecting this platform',
'ref' => 'Modules with a matching ref',
'type' => 'Modules of a specific type (exploit, auxiliary, or post)',

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2007-4387' ],
[ 'OSVDB', '37667' ],
[ 'BID', '36075' ],
[ 'URL', 'http://seclists.org/bugtraq/2007/Aug/225' ],
],

View File

@ -38,7 +38,6 @@ class MetasploitModule < Msf::Auxiliary
'References' => [
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041'],
[ 'URL', 'http://1337day.com/exploit/description/22581' ],
[ 'OSVDB', '110664' ],
[ 'CVE', '2014-6041' ]
],
'DefaultAction' => 'WebServer'

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2005-2611'],
['OSVDB', '18695'],
['BID', '14551'],
['URL', 'http://www.fpns.net/willy/msbksrc.lzh'],
],

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '17627' ],
[ 'CVE', '2005-0771' ],
[ 'URL', 'http://www.idefense.com/application/poi/display?id=269&type=vulnerabilities'],
],

View File

@ -28,8 +28,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'BID', '19680' ],
[ 'CVE', '2006-4313' ],
[ 'OSVDB', '28139' ],
[ 'OSVDB', '28138' ]
],
'DisclosureDate' => 'Aug 23 2006'))

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2004-0795' ],
[ 'OSVDB', '4180' ],
[ 'BID', '9821' ],
],
'DisclosureDate' => 'Mar 4 2004'))

View File

@ -20,10 +20,6 @@ class MetasploitModule < Msf::Auxiliary
this module, wait until the real administrator logs in, then specify the
predicted cookie value to hijack their session.
},
'References' =>
[
['OSVDB', '60035'],
],
'Author' => 'hdm',
'License' => MSF_LICENSE
))

View File

@ -22,7 +22,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'CVE', '2008-0926' ],
[ 'BID', '28441' ],
[ 'OSVDB', '43690' ]
],
'Author' =>
[

View File

@ -22,7 +22,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ],
[ 'OSVDB', '45715' ],
[ 'CVE', '2008-2157' ],
[ 'BID', '29398' ],
],

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ],
[ 'CVE', '2008-2157' ],
[ 'OSVDB', '45715' ],
[ 'BID', '29398' ],
],
'DisclosureDate' => 'May 27 2008'))

View File

@ -31,7 +31,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2011-0923' ],
[ 'OSVDB', '72526' ],
[ 'ZDI', '11-055' ],
[ 'URL', 'http://hackarandas.com/blog/2011/08/04/hp-data-protector-remote-shell-for-hpux' ]
],

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-4824' ],
[ 'OSVDB', '98249' ],
[ 'BID', '62902' ],
[ 'ZDI', '13-240' ],
[ 'URL', 'https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03943547' ]

View File

@ -29,7 +29,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'US-CERT-VU', '586556' ],
[ 'CVE', '2012-4940' ],
[ 'OSVDB', '86802' ]
],
'Actions' =>
[

View File

@ -20,7 +20,6 @@ class MetasploitModule < Msf::Auxiliary
},
'References' =>
[
[ 'OSVDB', '54551' ],
[ 'URL', 'http://www.aushack.com/200904-contentkeeper.txt' ],
],
'Author' => [ 'patrick' ],

View File

@ -24,7 +24,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '89861' ],
[ 'EDB', '24453' ],
[ 'URL', 'http://www.dlink.com/uk/en/home-solutions/connect/routers/dir-600-wireless-n-150-home-router' ],
[ 'URL', 'http://www.s3cur1ty.de/home-network-horror-days' ],

View File

@ -20,7 +20,6 @@ class MetasploitModule < Msf::Auxiliary
},
'References' =>
[
[ 'OSVDB', '90733' ],
[ 'BID', '58231' ],
[ 'PACKETSTORM', '120591' ]
],

View File

@ -21,7 +21,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'EDB', '25252' ],
[ 'OSVDB', '93013' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-018' ]
],
'Author' => [

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
['BID', '60835'],
['CVE', '2013-2113'],
['CWE', '915'],
['OSVDB', '94655'],
['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=966804'],
['URL', 'http://projects.theforeman.org/issues/2630']
],

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '5798' ],
[ 'BID', '10224' ],
#[ 'CVE', '' ],# No CVE!
[ 'EDB', '294' ]

View File

@ -20,7 +20,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-2731' ],
[ 'OSVDB', '66160' ],
[ 'MSB', 'MS10-065' ],
[ 'URL', 'http://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/' ]
],

View File

@ -20,7 +20,6 @@ class MetasploitModule < Msf::Auxiliary
},
'References' =>
[
[ 'OSVDB', '55586' ],
[ 'CVE', '2009-2367' ],
],
'Author' => [ 'patrick' ],

View File

@ -24,7 +24,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-0738' ], # using a VERB other than GET/POST
[ 'OSVDB', '64171' ],
[ 'URL', 'http://www.redteam-pentesting.de/publications/jboss' ],
[ 'URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=574105' ]
],

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-0738' ], # using a VERB other than GET/POST
[ 'OSVDB', '64171' ],
[ 'URL', 'http://www.redteam-pentesting.de/publications/jboss' ],
[ 'URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=574105' ]
],

View File

@ -31,7 +31,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-1871' ],
[ 'OSVDB', '66881']
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Jul 19 2010'))

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '89912' ],
[ 'BID', '57760' ],
[ 'EDB', '24475' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-004' ]

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'EDB', '31758' ],
[ 'OSVDB', '103521' ],
[ 'URL', 'http://www.devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/' ] # a huge amount of details about this vulnerability and the original exploit
],
'DisclosureDate' => 'Feb 19 2014'))

View File

@ -33,7 +33,6 @@ class MetasploitModule < Msf::Auxiliary
[ 'URL', 'http://www.s3cur1ty.de/attacking-linksys-wrt54gl' ],
[ 'EDB', '24202' ],
[ 'BID', '57459' ],
[ 'OSVDB', '89421' ]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Jan 18 2013'))

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2014-7862'],
['OSVDB', '116554'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/2'],
['URL', 'https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_dc9_admin.txt'],
],

View File

@ -35,7 +35,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2014-7863'],
['OSVDB', '117696'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/114'],
['URL', 'https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_failservlet.txt']
],

View File

@ -33,7 +33,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2014-7863'],
['OSVDB', '117695'],
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/114'],
['URL', 'https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_failservlet.txt']
],

View File

@ -33,7 +33,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2014-8499' ],
[ 'OSVDB', '114485' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Nov/18' ],
[ 'URL', 'https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_pmp_privesc.txt' ],
],

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2014-5445' ],
[ 'OSVDB', '115340' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Dec/9' ],
[ 'URL', 'https://github.com/pedrib/PoC/blob/master/advisories/ManageEngine/me_netflow_it360_file_dl.txt' ]
],

View File

@ -32,7 +32,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'BID', '72640' ],
[ 'OSVDB', '118316' ],
[ 'URL', 'https://github.com/darkarnium/secpub/tree/master/NetGear/SOAPWNDR' ]
],
'Author' =>

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2011-2750' ],
[ 'OSVDB', '73729' ],
[ 'URL', 'http://aluigi.org/adv/nfr_2-adv.txt'],
]
))

View File

@ -30,7 +30,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2013-3617'],
['OSVDB', '99141'],
['BID', '63431'],
['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats']
],

View File

@ -38,7 +38,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-0233'],
[ 'OSVDB', '89642' ],
[ 'BID', '57577' ],
[ 'URL', 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/'],
[ 'URL', 'http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html'],

View File

@ -20,7 +20,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2012-2626' ],
[ 'OSVDB', '84318' ],
[ 'URL', 'https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt' ]
],
'Author' =>

View File

@ -28,7 +28,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-2641' ],
[ 'OSVDB', '91953' ],
[ 'BID', '58833' ],
[ 'EDB', '24932' ],
[ 'URL', 'http://www.sophos.com/en-us/support/knowledgebase/118969.aspx' ],

View File

@ -28,7 +28,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'URL', 'http://tomcat.apache.org/' ],
[ 'OSVDB', '47464' ],
[ 'CVE', '2008-2938' ],
[ 'URL', 'http://www.securityfocus.com/archive/1/499926' ],
],

View File

@ -25,8 +25,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'URL', 'http://tomcat.apache.org/' ],
[ 'OSVDB', '47464' ],
[ 'OSVDB', '73447' ],
[ 'CVE', '2008-2938' ],
[ 'URL', 'http://www.securityfocus.com/archive/1/499926' ],
[ 'EDB', '17388' ],

View File

@ -20,7 +20,6 @@ class MetasploitModule < Msf::Auxiliary
},
'References' =>
[
['OSVDB', '51536'],
['URL', 'http://blog.c22.cc/advisories/typo3-sa-2009-001'],
['URL', 'http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/'],
],

View File

@ -22,7 +22,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '52048'],
['CVE', '2009-0815'],
['URL', 'http://secunia.com/advisories/33829/'],
['EDB', '8038'],

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'URL', 'http://blog.imperva.com/2013/10/threat-advisory-a-vbulletin-exploit-administrator-injection.html'],
[ 'OSVDB', '98370' ],
[ 'URL', 'http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/3991423-potential-vbulletin-exploit-vbulletin-4-1-vbulletin-5']
],
'DisclosureDate' => 'Oct 09 2013'))

View File

@ -32,7 +32,6 @@ class MetasploitModule < Msf::Auxiliary
[
['CVE', '2014-6324'],
['MSB', 'MS14-068'],
['OSVDB', '114751'],
['URL', 'http://blogs.technet.com/b/srd/archive/2014/11/18/additional-information-about-cve-2014-6324.aspx'],
['URL', 'https://labs.mwrinfosecurity.com/blog/2014/12/16/digging-into-ms14-068-exploitation-and-defence/'],
['URL', 'https://github.com/bidord/pykek'],

View File

@ -21,7 +21,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '40210' ],
['BID', '27206'],
['CVE', '2008-0244'],
],

View File

@ -52,7 +52,6 @@ class MetasploitModule < Msf::Auxiliary
],
'References' =>
[
[ 'OSVDB', '101653' ],
[ 'URL', 'https://github.com/elvanderb/TCP-32764' ]
],
'DisclosureDate' => "Dec 31 2013" ))

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' => [
[ 'CVE', '2004-1550' ],
[ 'OSVDB', '10232' ],
[ 'URL', 'http://seclists.org/bugtraq/2004/Sep/0339.html'],
],
'DisclosureDate' => 'Sep 24 2004'))

View File

@ -25,7 +25,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'MSB', 'MS08-059' ],
[ 'CVE', '2008-3466' ],
[ 'OSVDB', '49068' ],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=745' ],
],
'DisclosureDate' => 'Oct 14 2008'))

View File

@ -21,7 +21,6 @@ class MetasploitModule < Msf::Auxiliary
},
'References' =>
[
[ 'OSVDB', '48730' ],
[ 'CVE', '2008-2439' ],
[ 'BID', '31531' ],
[ 'URL', 'http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt' ],

View File

@ -20,7 +20,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2008-5448' ],
[ 'OSVDB', '51342' ],
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html' ],
[ 'ZDI', '09-003' ],
],

View File

@ -23,9 +23,7 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2009-1977' ],
[ 'OSVDB', '55903' ],
[ 'CVE', '2009-1978' ],
[ 'OSVDB', '55904' ],
[ 'ZDI', '09-058' ],
[ 'ZDI', '09-059' ],
],

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-0904' ],
[ 'OSVDB', '66338'],
[ 'ZDI', '10-118' ],
],
'DisclosureDate' => 'Jul 13 2010'))

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '368' ],
[ 'BID', '1484' ],
],
'DisclosureDate' => 'Jul 14 2000'))

View File

@ -24,7 +24,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '92704' ],
[ 'EDB', '24963' ],
[ 'URL', 'http://erpscan.com/wp-content/uploads/2012/11/Breaking-SAP-Portal-HackerHalted-2012.pdf']
],

View File

@ -25,7 +25,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'CVE', '2014-0763' ],
[ 'ZDI', '14-077' ],
[ 'OSVDB', '105572' ],
[ 'BID', '66740' ],
[ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-14-079-03' ]
],

View File

@ -28,7 +28,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-0653' ],
[ 'OSVDB', '89490' ],
[ 'BID', '57505' ],
[ 'URL', 'http://ics-cert.us-cert.gov/advisories/ICSA-13-022-02' ]
],

View File

@ -29,7 +29,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2007-6507' ],
[ 'OSVDB', '44318' ],
[ 'ZDI', '07-077'],
],
'Actions' =>

View File

@ -34,7 +34,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' => [
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
[ 'OSVDB', '3106'],
[ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ],
[ 'URL', 'http://sourceforge.net/projects/smbexec/' ],
[ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ]

View File

@ -34,7 +34,6 @@ class MetasploitModule < Msf::Auxiliary
],
'References' =>
[
['OSVDB', '62145'],
['URL', 'http://www.samba.org/samba/news/symlink_attack.html']
],
'License' => MSF_LICENSE

View File

@ -32,7 +32,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2003-0027'],
['OSVDB', '8201'],
['BID', '6665'],
['URL', 'http://marc.info/?l=bugtraq&m=104326556329850&w=2']
],

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '30172'],
['BID', '20858'],
['CVE', '2006-5702'],
['URL', 'http://secunia.com/advisories/22678/'],

View File

@ -29,7 +29,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['BID', '17978'],
['OSVDB', '25479'],
['URL', 'http://secunia.com/advisories/20107/'],
['CVE', '2006-2369'],
],

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '66842'],
['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'],
['US-CERT-VU', '362332']
]

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '66842'],
['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'],
['US-CERT-VU', '362332']
]

View File

@ -21,7 +21,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '66842'],
['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'],
['US-CERT-VU', '362332']
],

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '66842'],
['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'],
['US-CERT-VU', '362332']
],

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '85247'],
['BID', '55446'],
['CVE', '2012-2983'],
['URL', 'http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf'],

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '26772'],
['BID', '18744'],
['CVE', '2006-3392'],
['US-CERT-VU', '999601'],

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '71420'],
[ 'ZDI', '11-113' ],
[ 'EDB', '17078' ],
],

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'BID', '1154'],
[ 'CVE', '2000-0380'],
[ 'OSVDB', '1302' ],
],
'DisclosureDate' => 'Apr 26 2000'))

View File

@ -29,7 +29,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-2156' ],
[ 'OSVDB', '65246'],
[ 'EDB', '14185']
]
)

View File

@ -24,7 +24,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'BID', '16838' ],
[ 'OSVDB', '23511' ],
[ 'CVE', '2006-0900' ],
]))

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2011-0514' ],
[ 'OSVDB', '70617' ],
[ 'EDB', '15940' ],
],
'DisclosureDate' => 'Jan 8 2011' ))

View File

@ -28,7 +28,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
# patrickw - I am not sure if these are correct, but the closest match!
[ 'OSVDB', '7246' ],
[ 'CVE', '2004-2691' ],
[ 'URL', 'http://support.3com.com/infodeli/tools/switches/dna1695-0aaa17.pdf' ],
],

View File

@ -44,7 +44,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-0425' ],
[ 'OSVDB', '62674'],
[ 'BID', '38494' ],
[ 'URL', 'https://issues.apache.org/bugzilla/show_bug.cgi?id=48509' ],
[ 'URL', 'http://www.gossamer-threads.com/lists/apache/cvs/381537' ],

View File

@ -40,7 +40,6 @@ class MetasploitModule < Msf::Auxiliary
[ 'BID', '49303'],
[ 'CVE', '2011-3192'],
[ 'EDB', '17696'],
[ 'OSVDB', '74721' ],
],
'DisclosureDate' => 'Aug 19 2011'
))

View File

@ -29,7 +29,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2010-2227' ],
[ 'OSVDB', '66319' ],
[ 'BID', '41544' ]
],
'DisclosureDate' => 'Jul 09 2010'))

View File

@ -29,7 +29,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-02/0650.html' ],
[ 'BID', '9750' ],
[ 'OSVDB', '4077' ],
[ 'CVE', '2004-0331' ],
],
'DisclosureDate' => 'Feb 26 2004'))

View File

@ -25,7 +25,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2013-3843'],
['OSVDB', '93853'],
['BID', '60333']
],
'DisclosureDate' => 'May 30 2013'))

View File

@ -30,7 +30,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-4450' ],
[ 'OSVDB', '98724' ],
[ 'BID' , '63229' ],
[ 'URL', 'http://blog.nodejs.org/2013/10/22/cve-2013-4450-http-server-pipeline-flood-dos' ]
],

View File

@ -30,7 +30,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-6414' ],
[ 'OSVDB', '100525' ],
[ 'BID', '64074' ],
[ 'URL', 'http://seclists.org/oss-sec/2013/q4/400' ],
[ 'URL', 'https://github.com/rails/rails/commit/bee3b7f9371d1e2ddcfe6eaff5dcb26c0a248068' ]

View File

@ -30,7 +30,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-4164' ],
[ 'OSVDB', '100113' ],
[ 'URL', 'https://www.ruby-lang.org/en/news/2013/11/22/ruby-1-9-3-p484-is-released/' ]
],
'DisclosureDate' => 'Nov 22 2013'))

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'References' => [
[ 'BID', '35145' ],
#[ 'CVE', '' ], # no CVE?
[ 'OSVDB', '54881' ],
[ 'URL', 'http://www.aushack.com/200905-sonicwall.txt' ],
],
'DisclosureDate' => 'May 29 2009'))

View File

@ -24,7 +24,6 @@ class MetasploitModule < Msf::Auxiliary
'References' => [
[ 'BID', '30644'],
[ 'CVE', '2008-3656'],
[ 'OSVDB', '47471' ],
[ 'URL', 'http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/']
],
'DisclosureDate' => 'Aug 08 2008'))

View File

@ -27,7 +27,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['URL', 'http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9034'],
['OSVDB', '114857'],
['WPVDB', '7681']
],
'DisclosureDate' => 'Nov 20 2014'

View File

@ -21,7 +21,6 @@ class MetasploitModule < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' => [
[ 'CVE', '2008-5081' ],
[ 'OSVDB', '50929' ],
],
'DisclosureDate' => 'Nov 14 2008')

View File

@ -22,7 +22,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2009-3591' ],
[ 'OSVDB', '58884' ],
[ 'BID', '36606' ]
],
'DisclosureDate' => "Oct 05 2009" ))

View File

@ -45,7 +45,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'CVE', '2013-3986' ],
[ 'OSVDB', '99552' ],
[ 'BID', '63611'],
[ 'URL', 'http://www-01.ibm.com/support/docview.wss?uid=swg21654041' ],
[ 'URL', 'http://xforce.iss.net/xforce/xfdb/84969' ]

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['EDB', '38979'],
['OSVDB', '132307']
],
'DisclosureDate' => "Dec 15 2015",
))

View File

@ -23,7 +23,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'URL', 'https://code.google.com/p/memcached/issues/detail?id=192' ],
[ 'CVE', '2011-4971' ],
[ 'OSVDB', '92867' ]
],
'Author' => [ 'Gregory Man <man.gregory[at]gmail.com>' ],
'License' => MSF_LICENSE

View File

@ -29,7 +29,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'BID', '37255' ],
[ 'CVE', '2009-3563' ],
[ 'OSVDB', '60847' ],
[ 'URL', 'https://support.ntp.org/bugs/show_bug.cgi?id=1331' ]
],
'DisclosureDate' => 'Oct 04 2009'))

View File

@ -26,7 +26,6 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'BID', '5807' ],
[ 'CVE', '2002-1214' ],
[ 'OSVDB', '13422' ],
[ 'MSB', 'MS02-063' ],
],
'DisclosureDate' => 'Sep 26 2002'))

View File

@ -25,7 +25,6 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
['CVE', '2007-2446'],
['OSVDB', '34699'],
]
))

Some files were not shown because too many files have changed in this diff Show More