More osvdb references from Steve Tornio

git-svn-id: file:///home/svn/framework3/trunk@6547 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-05-12 19:56:54 +00:00
parent 0ab728c6a5
commit 0981295879
12 changed files with 20 additions and 11 deletions

View File

@ -30,9 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['CVE', '2005-0116'],
['OSVDB', '13002'], ['OSVDB', '13002'],
['BID', '12298'], ['BID', '12298'],
['CVE', '2005-0116'],
['URL', 'http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities'], ['URL', 'http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities'],
['MIL', '8'], ['MIL', '8'],
], ],
@ -100,4 +100,4 @@ class Metasploit3 < Msf::Exploit::Remote
end end
end end
end end

View File

@ -32,9 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['CVE', '2006-2237'],
['OSVDB', '25284'], ['OSVDB', '25284'],
['BID', '17844'], ['BID', '17844'],
['CVE', '2006-2237'],
['URL', 'http://awstats.sourceforge.net/awstats_security_news.php'], ['URL', 'http://awstats.sourceforge.net/awstats_security_news.php'],
['URL', 'http://www.milw0rm.com/exploits/1755'], ['URL', 'http://www.milw0rm.com/exploits/1755'],
], ],
@ -103,4 +103,4 @@ class Metasploit3 < Msf::Exploit::Remote
end end
end end
end end

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2009-0927' ], [ 'CVE', '2009-0927' ],
[ 'OSVDB', '53647' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ], [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ],
], ],
'DefaultOptions' => 'DefaultOptions' =>

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE' , '2009-0658' ], [ 'CVE' , '2009-0658' ],
[ 'OSVDB', '52073' ],
[ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'], [ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'],
], ],
'DefaultOptions' => 'DefaultOptions' =>

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2008-2992' ], [ 'CVE', '2008-2992' ],
[ 'OSVDB', '49520' ],
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {

View File

@ -40,9 +40,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', ' 10889'],
[ 'CVE', ' 2004-0636'], [ 'CVE', ' 2004-0636'],
[ 'OSVDB', '8398' ], [ 'OSVDB', '8398' ],
[ 'BID', ' 10889'],
[ 'MIL', '3' ], [ 'MIL', '3' ],
[ 'URL', 'http://www.idefense.com/application/poi/display?id=121&type=vulnerabilities' ], [ 'URL', 'http://www.idefense.com/application/poi/display?id=121&type=vulnerabilities' ],
], ],
@ -93,4 +93,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli) handler(cli)
end end
end end

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2007-5659' ], [ 'CVE', '2007-5659' ],
[ 'OSVDB', '41495' ]
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2009-0927' ], [ 'CVE', '2009-0927' ],
[ 'OSVDB', '53647' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ], [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ],
], ],
'DefaultOptions' => 'DefaultOptions' =>

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE' , '2009-0658' ], [ 'CVE' , '2009-0658' ],
[ 'OSVDB', '52073' ],
[ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'], [ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'],
], ],
'DefaultOptions' => 'DefaultOptions' =>
@ -227,4 +228,4 @@ class Metasploit3 < Msf::Exploit::Remote
pdf << "%%EOF" << eol pdf << "%%EOF" << eol
end end
end end

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2008-2992' ], [ 'CVE', '2008-2992' ],
[ 'OSVDB', '49520' ]
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {

View File

@ -31,6 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2003-0471' ],
[ 'OSVDB', '2207' ],
[ 'BID', '8024'], [ 'BID', '8024'],
[ 'NSS', '11771'], [ 'NSS', '11771'],
[ 'MIL', '95'], [ 'MIL', '95'],
@ -113,4 +115,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler handler
end end
end end

View File

@ -28,9 +28,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['BID', '21320'],
['OSVDB', '11350'],
['CVE', '2006-6184'], ['CVE', '2006-6184'],
['OSVDB', '11350'],
['BID', '21320'],
['URL','http://milw0rm.com/exploits/2887'], ['URL','http://milw0rm.com/exploits/2887'],
['URL', 'ftp://guest:guest@ftp.alliedtelesyn.co.uk/pub/utilities/at-tftpd.exe'], ['URL', 'ftp://guest:guest@ftp.alliedtelesyn.co.uk/pub/utilities/at-tftpd.exe'],
], ],
@ -85,4 +85,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp disconnect_udp
end end
end end