mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 13:11:28 +00:00
More script updates to change Metasploit Redmine
references to valid Github URLs
This commit is contained in:
@@ -15,7 +15,7 @@ arguments.
|
||||
|
||||
References:
|
||||
* http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
|
||||
* https://dev.metasploit.com/redmine/projects/framework/repository/revisions/13093
|
||||
* https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb
|
||||
* http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2011-2523
|
||||
]]
|
||||
|
||||
@@ -45,7 +45,7 @@ References:
|
||||
-- | http://osvdb.org/73573
|
||||
-- | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2523
|
||||
-- | http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
|
||||
-- |_ https://dev.metasploit.com/redmine/projects/framework/repository/revisions/13093
|
||||
-- |_ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb
|
||||
--
|
||||
|
||||
author = "Daniel Miller"
|
||||
@@ -141,7 +141,7 @@ action = function(host, port)
|
||||
vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04.]],
|
||||
references = {
|
||||
'http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html',
|
||||
'https://dev.metasploit.com/redmine/projects/framework/repository/revisions/13093',
|
||||
'https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb',
|
||||
},
|
||||
dates = {
|
||||
disclosure = {year = '2011', month = '07', day = '03'},
|
||||
|
||||
@@ -27,7 +27,7 @@ lifetime (a few seconds)
|
||||
|
||||
See also:
|
||||
* RFC 4862, IPv6 Stateless Address Autoconfiguration, especially section 5.5.3.
|
||||
* http://dev.metasploit.com/redmine/projects/framework/repository/changes/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb
|
||||
* https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb
|
||||
]]
|
||||
|
||||
---
|
||||
|
||||
@@ -47,7 +47,7 @@ categories = {"default", "version", "discovery", "vuln"}
|
||||
-- http://www.vxdev.com/docs/vx55man/tornado-api/wdbpcl/wdb.html
|
||||
-- http://www.verysource.com/code/2817990_1/wdb.h.html
|
||||
-- Metasploit scanner module
|
||||
-- http://www.metasploit.com/redmine/projects/framework/repository/entry/lib/msf/core/exploit/wdbrpc.rb
|
||||
-- https://github.com/rapid7/metasploit-framework/blob/master/lib/msf/core/exploit/wdbrpc.rb
|
||||
|
||||
portrule = shortport.version_port_or_service(17185, "wdbrpc", {"udp"} )
|
||||
|
||||
|
||||
Reference in New Issue
Block a user