diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index e31df1ce85..3ae85c7803 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -6231,7 +6231,7 @@ "references": [ "CVE-2007-6750", "CVE-2010-2227", - "URL-https://www.exploit-db.com/exploits/8976/", + "EDB-8976", "URL-https://github.com/gkbrk/slowloris" ], "is_server": false, @@ -6240,7 +6240,7 @@ "arch": "", "rport": 80, "targets": null, - "mod_time": "2018-03-07 17:06:04 +0000", + "mod_time": "2018-08-28 13:49:31 +0000", "path": "/modules/auxiliary/dos/http/slowloris.py", "is_install_path": true, "ref_name": "dos/http/slowloris", @@ -6946,7 +6946,7 @@ ], "description": "This module sends a specially crafted packet to port 50000/UDP\n causing a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) devices.\n A manual reboot is required to return the device to service.\n CVE-2015-5374 and a CVSS v2 base score of 7.8 have been assigned to this vulnerability.", "references": [ - "URL-https://www.exploit-db.com/exploits/44103/", + "EDB-44103", "URL-https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01" ], "is_server": false, @@ -6955,7 +6955,7 @@ "arch": "", "rport": 50000, "targets": null, - "mod_time": "2018-03-13 09:30:48 +0000", + "mod_time": "2018-08-28 13:12:43 +0000", "path": "/modules/auxiliary/dos/scada/siemens_siprotec4.rb", "is_install_path": true, "ref_name": "dos/scada/siemens_siprotec4", @@ -7212,7 +7212,7 @@ "description": "Claymore’s Dual GPU Miner 10.5 and below is vulnerable to a format strings vulnerability. This allows an\n unauthenticated attacker to read memory addresses, or immediately terminate the mining process causing\n a denial of service.", "references": [ "CVE-2018-6317", - "URL-https://www.exploit-db.com/exploits/43972/", + "EDB-43972", "URL-https://github.com/nanopool/Claymore-Dual-Miner" ], "is_server": false, @@ -7221,7 +7221,7 @@ "arch": "", "rport": 3333, "targets": null, - "mod_time": "2018-08-28 13:34:02 +0000", + "mod_time": "2018-08-29 06:09:40 +0000", "path": "/modules/auxiliary/dos/tcp/claymore_dos.py", "is_install_path": true, "ref_name": "dos/tcp/claymore_dos", @@ -34618,7 +34618,7 @@ "references": [ "EDB-40889", "URL-http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=305", - "URL-https://www.kb.cert.org/vuls/id/582384", + "US-CERT-VU-582384", "URL-http://kb.netgear.com/000036386/CVE-2016-582384", "CVE-2016-6277" ], @@ -34630,7 +34630,7 @@ "targets": [ "Automatic Target" ], - "mod_time": "2017-07-24 06:26:21 +0000", + "mod_time": "2018-08-28 13:12:43 +0000", "path": "/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb", "is_install_path": true, "ref_name": "linux/http/netgear_r7000_cgibin_exec", @@ -84611,7 +84611,7 @@ "CVE-2017-5816", "EDB-43198", "ZDI-17-340", - "URL-https://www.securityfocus.com/bid/98469/info", + "BID-98469", "URL-https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us" ], "is_server": true, @@ -84622,7 +84622,7 @@ "targets": [ "Automatic" ], - "mod_time": "2018-01-05 11:28:14 +0000", + "mod_time": "2018-08-28 13:12:43 +0000", "path": "/modules/exploits/windows/misc/hp_imc_dbman_restartdb_unauth_rce.rb", "is_install_path": true, "ref_name": "windows/misc/hp_imc_dbman_restartdb_unauth_rce", @@ -84646,7 +84646,7 @@ "CVE-2017-5817", "EDB-43195", "ZDI-17-341", - "URL-https://www.securityfocus.com/bid/98469/info", + "BID-98469", "URL-https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us" ], "is_server": true, @@ -84657,7 +84657,7 @@ "targets": [ "Automatic" ], - "mod_time": "2018-01-05 11:28:48 +0000", + "mod_time": "2018-08-28 13:12:43 +0000", "path": "/modules/exploits/windows/misc/hp_imc_dbman_restoredbase_unauth_rce.rb", "is_install_path": true, "ref_name": "windows/misc/hp_imc_dbman_restoredbase_unauth_rce",