1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

[FixRM:#8129] - Remove invalid metasploit.com references

These "metasploit.com" references aren't related to the vulns,
shouldn't be in them.
This commit is contained in:
sinn3r 2013-07-03 11:52:10 -05:00
parent ad83ef826c
commit 7ef5695867
6 changed files with 6 additions and 11 deletions

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
'Author' => 'MJC',
'References' =>
[
[ 'URL', 'http://www.metasploit.com'],
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2011/06/02/vsploit--virtualizing-exploitation-attributes-with-metasploit-framework']
],
'DefaultOptions' => { 'HTTP::server_name' => 'IIS'}
))

View File

@ -53,8 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'MSB', 'MS12-063' ],
[ 'URL', 'http://technet.microsoft.com/en-us/security/advisory/2757760' ],
[ 'URL', 'http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/' ],
[ 'URL', 'http://blog.vulnhunt.com/index.php/2012/09/17/ie-execcommand-fuction-use-after-free-vulnerability-0day/'],
[ 'URL', 'http://metasploit.com' ]
[ 'URL', 'http://blog.vulnhunt.com/index.php/2012/09/17/ie-execcommand-fuction-use-after-free-vulnerability-0day/']
],
'Payload' =>
{

View File

@ -26,8 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'OSVDB', '94540' ],
[ 'EDB', '16639' ],
[ 'URL', 'http://www.metasploit.com' ]
[ 'EDB', '16639' ]
],
'DefaultOptions' =>
{

View File

@ -35,8 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['OSVDB', '88302'],
['OSVDB', '88303'],
['URL', 'http://metasploit.com']
['OSVDB', '88303']
],
'Platform' => 'win',
'Targets' =>

View File

@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2006-5792' ],
[ 'OSVDB', '33969' ],
[ 'URL', 'http://www.metasploit.com/' ],
[ 'URL', 'http://www.xlink.com' ],
[ 'URL', 'http://www.xlink.com' ]
],
'DefaultOptions' =>
{

View File

@ -27,8 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2006-5792' ],
[ 'OSVDB', '58646' ],
[ 'URL', 'http://www.metasploit.com/' ],
[ 'URL', 'http://www.xlink.com' ],
[ 'URL', 'http://www.xlink.com' ]
],
'Privileged' => true,
'DefaultOptions' =>