More osvdb references from Steve Tornio
git-svn-id: file:///home/svn/framework3/trunk@6547 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
0ab728c6a5
commit
0981295879
|
@ -30,9 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2005-0116'],
|
||||
['OSVDB', '13002'],
|
||||
['BID', '12298'],
|
||||
['CVE', '2005-0116'],
|
||||
['URL', 'http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities'],
|
||||
['MIL', '8'],
|
||||
],
|
||||
|
@ -100,4 +100,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -32,9 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2006-2237'],
|
||||
['OSVDB', '25284'],
|
||||
['BID', '17844'],
|
||||
['CVE', '2006-2237'],
|
||||
['URL', 'http://awstats.sourceforge.net/awstats_security_news.php'],
|
||||
['URL', 'http://www.milw0rm.com/exploits/1755'],
|
||||
],
|
||||
|
@ -103,4 +103,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-0927' ],
|
||||
[ 'OSVDB', '53647' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE' , '2009-0658' ],
|
||||
[ 'OSVDB', '52073' ],
|
||||
[ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-2992' ],
|
||||
[ 'OSVDB', '49520' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -40,9 +40,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', ' 10889'],
|
||||
[ 'CVE', ' 2004-0636'],
|
||||
[ 'OSVDB', '8398' ],
|
||||
[ 'BID', ' 10889'],
|
||||
[ 'MIL', '3' ],
|
||||
[ 'URL', 'http://www.idefense.com/application/poi/display?id=121&type=vulnerabilities' ],
|
||||
],
|
||||
|
@ -93,4 +93,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
handler(cli)
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-5659' ],
|
||||
[ 'OSVDB', '41495' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-0927' ],
|
||||
[ 'OSVDB', '53647' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE' , '2009-0658' ],
|
||||
[ 'OSVDB', '52073' ],
|
||||
[ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
@ -227,4 +228,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
pdf << "%%EOF" << eol
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-2992' ],
|
||||
[ 'OSVDB', '49520' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -31,6 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2003-0471' ],
|
||||
[ 'OSVDB', '2207' ],
|
||||
[ 'BID', '8024'],
|
||||
[ 'NSS', '11771'],
|
||||
[ 'MIL', '95'],
|
||||
|
@ -113,4 +115,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
handler
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -28,9 +28,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['BID', '21320'],
|
||||
['OSVDB', '11350'],
|
||||
['CVE', '2006-6184'],
|
||||
['OSVDB', '11350'],
|
||||
['BID', '21320'],
|
||||
['URL','http://milw0rm.com/exploits/2887'],
|
||||
['URL', 'ftp://guest:guest@ftp.alliedtelesyn.co.uk/pub/utilities/at-tftpd.exe'],
|
||||
],
|
||||
|
@ -85,4 +85,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
disconnect_udp
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue