A list of exploits and references can be generated using tools/module_reference.rb:
$ tools/module_reference.rb -h
Metasploit Script for Displaying Module Reference information.
==========================================================
OPTIONS:
-c Check reference status
-f <opt> Filter based on Module Type [All,Exploit,Payload,Post,NOP,Encoder,Auxiliary] (Default = ALL).
-h Help menu.
-o <opt> Save the results to a file
-r Reverse Sort
-s Sort by Reference instead of Module Type.
-t <opt> Type of Reference to sort by ["ALL", "OSVDB", "CVE", "CWE", "BID", "MSB", "EDB", "US-CERT-VU", "ZDI", "WPVDB", "URL"]
-x <opt> String or RegEx to try and match against the Reference Field
Kvasir should parse the result and anything with a CVE should be added to the t_exploits table. If a valid MSFRPC instance module.info should be called to get more details but this is a separate function yet to be written.
A list of exploits and references can be generated using tools/module_reference.rb:
Kvasir should parse the result and anything with a CVE should be added to the t_exploits table. If a valid MSFRPC instance module.info should be called to get more details but this is a separate function yet to be written.