Skip to content

Commit 0017fbd

Browse files
committed
Updates more dead links
1 parent 810e7c4 commit 0017fbd

File tree

133 files changed

+146
-146
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+146
-146
lines changed

modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ def initialize(info = {})
3333
'Actions' => [[ 'WebServer', 'Description' => 'Serve exploit via web server' ]],
3434
'PassiveActions' => [ 'WebServer' ],
3535
'References' => [
36-
[ 'URL', 'https://www.rapid7.com/blog/post/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041/'],
36+
[ 'URL', 'http://web.archive.org/web/20230321034739/https://www.rapid7.com/blog/post/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041/'],
3737
[ 'URL', 'https://web.archive.org/web/20150316151817/http://1337day.com/exploit/description/22581' ],
3838
[ 'OSVDB', '110664' ],
3939
[ 'CVE', '2014-6041' ]

modules/auxiliary/admin/firetv/firetv_youtube.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
},
1818
'Author' => ['wvu'],
1919
'References' => [
20-
['URL', 'https://www.amazon.com/dp/B00CX5P8FC?_encoding=UTF8&showFS=1'],
20+
['URL', 'http://web.archive.org/web/20210301101536/http://www.amazon.com/dp/B00CX5P8FC/?_encoding=UTF8'],
2121
['URL', 'https://www.amazon.com/dp/B00GDQ0RMG/ref=fs_ftvs']
2222
],
2323
'License' => MSF_LICENSE,

modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ def initialize(info = {})
4444
[ 'CVE', '2015-0964' ], # XSS vulnerability
4545
[ 'CVE', '2015-0965' ], # CSRF vulnerability
4646
[ 'CVE', '2015-0966' ], # "technician/yZgO8Bvj" web interface backdoor
47-
[ 'URL', 'https://www.rapid7.com/blog/post/2015/06/05/r7-2015-01-csrf-backdoor-and-persistent-xss-on-arris-motorola-cable-modems/' ],
47+
[ 'URL', 'http://web.archive.org/web/20220810083803/https://www.rapid7.com/blog/post/2015/06/05/r7-2015-01-csrf-backdoor-and-persistent-xss-on-arris-motorola-cable-modems/' ],
4848
]
4949
)
5050
)

modules/auxiliary/admin/http/cisco_ios_xe_cli_exec_cve_2023_20198.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ def initialize(info = {})
5555
['CVE', '2023-20198'],
5656
# Vendor advisories.
5757
['URL', 'https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z'],
58-
['URL', 'https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/'],
58+
['URL', 'http://web.archive.org/web/20250214093736/https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/'],
5959
# Vendor list of (205) vulnerable versions.
6060
['URL', 'https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z/cvrf/cisco-sa-iosxe-webui-privesc-j22SaA4z_cvrf.xml'],
6161
# Technical details on CVE-2023-20198.

modules/auxiliary/admin/http/cisco_ios_xe_os_exec_cve_2023_20273.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ def initialize(info = {})
5555
['CVE', '2023-20273'],
5656
# Vendor advisories.
5757
['URL', 'https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z'],
58-
['URL', 'https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/'],
58+
['URL', 'http://web.archive.org/web/20250214093736/https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/'],
5959
# Vendor list of (205) vulnerable versions.
6060
['URL', 'https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z/cvrf/cisco-sa-iosxe-webui-privesc-j22SaA4z_cvrf.xml'],
6161
# Technical details on CVE-2023-20198.

modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ def initialize(info = {})
2727
'References' => [
2828
[ 'CVE', '2013-0136' ],
2929
[ 'US-CERT-VU', '701572' ],
30-
[ 'URL', 'https://www.rapid7.com/blog/post/2013/05/15/new-1day-exploits-mutiny-vulnerabilities/' ]
30+
[ 'URL', 'http://web.archive.org/web/20250114041839/https://www.rapid7.com/blog/post/2013/05/15/new-1day-exploits-mutiny-vulnerabilities/' ]
3131
],
3232
'Actions' => [
3333
['Read', { 'Description' => 'Read arbitrary file' }],

modules/auxiliary/admin/http/nexpose_xxe_file_read.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ def initialize(info = {})
2727
],
2828
'License' => MSF_LICENSE,
2929
'References' => [
30-
[ 'URL', 'https://www.rapid7.com/blog/post/2013/08/16/r7-vuln-2013-07-24/' ]
30+
[ 'URL', 'http://web.archive.org/web/20230402081629/https://www.rapid7.com/blog/post/2013/08/16/r7-vuln-2013-07-24/' ]
3131
],
3232
'DefaultOptions' => {
3333
'SSL' => true

modules/auxiliary/admin/http/scrutinizer_add_user.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
'References' => [
2020
[ 'CVE', '2012-2626' ],
2121
[ 'OSVDB', '84318' ],
22-
[ 'URL', 'https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt' ]
22+
[ 'URL', 'http://web.archive.org/web/20130827051639/https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt' ]
2323
],
2424
'Author' => [
2525
'MC',

modules/auxiliary/admin/http/tomcat_ghostcat.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ def initialize(info = {})
4747
'References' => [
4848
['CVE', '2020-1938'],
4949
['EDB', '48143'],
50-
['URL', 'https://www.chaitin.cn/en/ghostcat']
50+
['URL', 'http://web.archive.org/web/20250114042903/https://www.chaitin.cn/en/ghostcat']
5151
],
5252
'DisclosureDate' => '2020-02-20',
5353
'Notes' => {

modules/auxiliary/admin/kerberos/ms14_068_kerberos_checksum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ def initialize(info = {})
3131
['OSVDB', '114751'],
3232
['URL', 'http://blogs.technet.com/b/srd/archive/2014/11/18/additional-information-about-cve-2014-6324.aspx'],
3333
['URL', 'https://labs.mwrinfosecurity.com/blog/2014/12/16/digging-into-ms14-068-exploitation-and-defence/'],
34-
['URL', 'https://github.com/bidord/pykek'],
34+
['URL', 'http://web.archive.org/web/20180107213459/https://github.com/bidord/pykek'],
3535
['URL', 'https://www.rapid7.com/blog/post/2014/12/25/12-days-of-haxmas-ms14-068-now-in-metasploit']
3636
],
3737
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)