More osvdb references from Steve Tornio

git-svn-id: file:///home/svn/framework3/trunk@6547 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-05-12 19:56:54 +00:00
parent 0ab728c6a5
commit 0981295879
12 changed files with 20 additions and 11 deletions

View File

@ -30,9 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2005-0116'],
['OSVDB', '13002'],
['BID', '12298'],
['CVE', '2005-0116'],
['URL', 'http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities'],
['MIL', '8'],
],
@ -100,4 +100,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end
end

View File

@ -32,9 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-2237'],
['OSVDB', '25284'],
['BID', '17844'],
['CVE', '2006-2237'],
['URL', 'http://awstats.sourceforge.net/awstats_security_news.php'],
['URL', 'http://www.milw0rm.com/exploits/1755'],
],
@ -103,4 +103,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end
end

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-0927' ],
[ 'OSVDB', '53647' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ],
],
'DefaultOptions' =>

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE' , '2009-0658' ],
[ 'OSVDB', '52073' ],
[ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'],
],
'DefaultOptions' =>

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-2992' ],
[ 'OSVDB', '49520' ],
],
'DefaultOptions' =>
{

View File

@ -40,9 +40,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', ' 10889'],
[ 'CVE', ' 2004-0636'],
[ 'OSVDB', '8398' ],
[ 'BID', ' 10889'],
[ 'MIL', '3' ],
[ 'URL', 'http://www.idefense.com/application/poi/display?id=121&type=vulnerabilities' ],
],
@ -93,4 +93,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-5659' ],
[ 'OSVDB', '41495' ]
],
'DefaultOptions' =>
{

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-0927' ],
[ 'OSVDB', '53647' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ],
],
'DefaultOptions' =>

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE' , '2009-0658' ],
[ 'OSVDB', '52073' ],
[ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'],
],
'DefaultOptions' =>
@ -227,4 +228,4 @@ class Metasploit3 < Msf::Exploit::Remote
pdf << "%%EOF" << eol
end
end
end

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-2992' ],
[ 'OSVDB', '49520' ]
],
'DefaultOptions' =>
{

View File

@ -31,6 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2003-0471' ],
[ 'OSVDB', '2207' ],
[ 'BID', '8024'],
[ 'NSS', '11771'],
[ 'MIL', '95'],
@ -113,4 +115,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -28,9 +28,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '21320'],
['OSVDB', '11350'],
['CVE', '2006-6184'],
['OSVDB', '11350'],
['BID', '21320'],
['URL','http://milw0rm.com/exploits/2887'],
['URL', 'ftp://guest:guest@ftp.alliedtelesyn.co.uk/pub/utilities/at-tftpd.exe'],
],
@ -85,4 +85,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp
end
end
end