diff --git a/modules/auxiliary/scanner/http/wp_simple_backup_file_read.rb b/modules/auxiliary/scanner/http/wp_simple_backup_file_read.rb index 68615dfb1a..4c8334e289 100644 --- a/modules/auxiliary/scanner/http/wp_simple_backup_file_read.rb +++ b/modules/auxiliary/scanner/http/wp_simple_backup_file_read.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ ['WPVDB', '7997'], - ['URL', 'http://packetstormsecurity.com/files/131919/'] + ['PACKETSTORM', '131919'] ], 'Author' => [ diff --git a/modules/auxiliary/scanner/http/wp_subscribe_comments_file_read.rb b/modules/auxiliary/scanner/http/wp_subscribe_comments_file_read.rb index f554f8d3c9..78e9e72086 100644 --- a/modules/auxiliary/scanner/http/wp_subscribe_comments_file_read.rb +++ b/modules/auxiliary/scanner/http/wp_subscribe_comments_file_read.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ ['WPVDB', '8102'], - ['URL', 'http://packetstormsecurity.com/files/132694/'], + ['PACKETSTORM', '132694'], ['URL', 'https://security.dxw.com/advisories/admin-only-local-file-inclusion-and-arbitrary-code-execution-in-subscribe-to-comments-2-1-2/'] ], 'Author' => diff --git a/modules/exploits/unix/webapp/wp_holding_pattern_file_upload.rb b/modules/exploits/unix/webapp/wp_holding_pattern_file_upload.rb index a9d966d9cd..50f0daf8e2 100644 --- a/modules/exploits/unix/webapp/wp_holding_pattern_file_upload.rb +++ b/modules/exploits/unix/webapp/wp_holding_pattern_file_upload.rb @@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote [ ['CVE', '2015-1172'], ['WPVDB', '7784'], - ['URL', 'http://packetstormsecurity.com/files/130282/WordPress-Holding-Pattern-0.6-Shell-Upload.html'] + ['PACKETSTORM', '130282'] ], 'DisclosureDate' => 'Feb 11 2015', 'Platform' => 'php', diff --git a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb index 20e9c182dc..cba67e8185 100644 --- a/modules/exploits/unix/webapp/wp_worktheflow_upload.rb +++ b/modules/exploits/unix/webapp/wp_worktheflow_upload.rb @@ -28,7 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote [ ['WPVDB', '7883'], ['EDB', '36640'], - ['URL', 'http://packetstormsecurity.com/files/131294/WordPress-Work-The-Flow-2.5.2-Shell-Upload.html'] + ['PACKETSTORM', '131294'] ], 'Privileged' => false, 'Platform' => 'php',