Remove bad references (dead links)
These links are no longer available. They are dead links.bug/bundler_fix
parent
93a2507223
commit
154fb585f4
|
@ -28,9 +28,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'BID', '19680' ],
|
||||
[ 'CVE', '2006-4313' ],
|
||||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml' ],
|
||||
[ 'OSVDB', '28139' ],
|
||||
[ 'OSVDB', '28138' ],
|
||||
[ 'OSVDB', '28138' ]
|
||||
],
|
||||
'DisclosureDate' => 'Aug 23 2006'))
|
||||
|
||||
|
|
|
@ -33,7 +33,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '2011-0923' ],
|
||||
[ 'OSVDB', '72526' ],
|
||||
[ 'ZDI', '11-055' ],
|
||||
[ 'URL', 'http://c4an-dl.blogspot.com/hp-data-protector-vuln.html' ],
|
||||
[ 'URL', 'http://hackarandas.com/blog/2011/08/04/hp-data-protector-remote-shell-for-hpux' ]
|
||||
],
|
||||
'Author' =>
|
||||
|
|
|
@ -46,8 +46,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' => [
|
||||
[ 'CVE', '2015-0964' ], # XSS vulnerability
|
||||
[ 'CVE', '2015-0965' ], # CSRF vulnerability
|
||||
[ 'CVE', '2015-0966' ], # "techician/yZgO8Bvj" web interface backdoor
|
||||
[ 'URL', 'https://community.rapid7.com/rapid7_blogpostdetail?id=a111400000AanBs' ] # Original disclosure
|
||||
[ 'CVE', '2015-0966' ] # "techician/yZgO8Bvj" web interface backdoor
|
||||
]
|
||||
))
|
||||
|
||||
|
|
|
@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'EDB', '25252' ],
|
||||
[ 'OSVDB', '93013' ],
|
||||
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-018' ],
|
||||
[ 'URL', 'http://www.dlink.com/de/de/home-solutions/connect/modems-and-gateways/dsl-320b-adsl-2-ethernet-modem' ],
|
||||
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-018' ]
|
||||
],
|
||||
'Author' => [
|
||||
'Michael Messner <devnull[at]s3cur1ty.de>'
|
||||
|
|
|
@ -26,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'OSVDB', '89912' ],
|
||||
[ 'BID', '57760' ],
|
||||
[ 'EDB', '24475' ],
|
||||
[ 'URL', 'http://homesupport.cisco.com/de-eu/support/routers/E1500' ],
|
||||
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-004' ]
|
||||
],
|
||||
'DisclosureDate' => 'Feb 05 2013'))
|
||||
|
|
|
@ -29,7 +29,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://homesupport.cisco.com/en-eu/support/routers/WRT54GL' ],
|
||||
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-01' ],
|
||||
[ 'URL', 'http://www.s3cur1ty.de/attacking-linksys-wrt54gl' ],
|
||||
[ 'EDB', '24202' ],
|
||||
|
|
|
@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['CVE', '2014-7862'],
|
||||
['OSVDB', '116554'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc9_admin.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/2']
|
||||
],
|
||||
'DisclosureDate' => 'Dec 31 2014'))
|
||||
|
|
|
@ -36,7 +36,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['CVE', '2014-7863'],
|
||||
['OSVDB', '117696'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/114']
|
||||
],
|
||||
'DisclosureDate' => 'Jan 28 2015'))
|
||||
|
|
|
@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['CVE', '2014-7863'],
|
||||
['OSVDB', '117695'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/114']
|
||||
],
|
||||
'DisclosureDate' => 'Jan 28 2015'))
|
||||
|
|
|
@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'CVE', '2014-8499' ],
|
||||
[ 'OSVDB', '114485' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Nov/18' ]
|
||||
],
|
||||
'DisclosureDate' => 'Nov 8 2014'))
|
||||
|
|
|
@ -28,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'CVE', '2014-5445' ],
|
||||
[ 'OSVDB', '115340' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_netflow_it360_file_dl.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Dec/9' ]
|
||||
],
|
||||
'DisclosureDate' => 'Nov 30 2014'))
|
||||
|
|
|
@ -29,9 +29,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'https://community.rapid7.com/community/nexpose/blog/2013/08/16/r7-vuln-2013-07-24' ],
|
||||
# Fill this in with the direct advisory URL from Infigo
|
||||
[ 'URL', 'http://www.infigo.hr/in_focus/advisories/' ]
|
||||
[ 'URL', 'https://community.rapid7.com/community/nexpose/blog/2013/08/16/r7-vuln-2013-07-24' ]
|
||||
],
|
||||
'DefaultOptions' => {
|
||||
'SSL' => true
|
||||
|
|
|
@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2015-2993' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Jun/8' ]
|
||||
],
|
||||
'DisclosureDate' => 'Jun 3 2015'))
|
||||
|
|
|
@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['CVE', '2015-2996'],
|
||||
['CVE', '2015-2997'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jun/8']
|
||||
],
|
||||
'DisclosureDate' => 'Jun 3 2015'))
|
||||
|
|
|
@ -29,7 +29,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['CVE', '2015-2996'],
|
||||
['CVE', '2015-2998'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt' ],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jun/8']
|
||||
],
|
||||
'DisclosureDate' => 'Jun 3 2015'))
|
||||
|
|
|
@ -21,11 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
as well as read privileges to the target file.
|
||||
},
|
||||
'Author' => [ 'todb' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://michaeldaw.org/sql-injection-cheat-sheet#postgres' ]
|
||||
]
|
||||
'License' => MSF_LICENSE
|
||||
))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -34,8 +34,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
['CVE', '2003-0027'],
|
||||
['OSVDB', '8201'],
|
||||
['BID', '6665'],
|
||||
['URL', 'http://marc.info/?l=bugtraq&m=104326556329850&w=2'],
|
||||
['URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000898.1-1']
|
||||
['URL', 'http://marc.info/?l=bugtraq&m=104326556329850&w=2']
|
||||
],
|
||||
# Tested OK against sol8.tor 20100624 -jjd
|
||||
'DisclosureDate' => 'Jan 22 2003')
|
||||
|
|
|
@ -21,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'https://github.com/claudijd/BNAT-Suite'],
|
||||
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels'],
|
||||
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels']
|
||||
]
|
||||
)
|
||||
register_options(
|
||||
|
|
|
@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'https://github.com/claudijd/BNAT-Suite'],
|
||||
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels'],
|
||||
[ 'URL', 'http://www.slideshare.net/claudijd/dc-skytalk-bnat-hijacking-repairing-broken-communication-channels']
|
||||
]
|
||||
)
|
||||
|
||||
|
|
|
@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'BID', '1154'],
|
||||
[ 'CVE', '2000-0380'],
|
||||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20000514-ios-http-server.shtml'],
|
||||
[ 'OSVDB', '1302' ],
|
||||
],
|
||||
'DisclosureDate' => 'Apr 26 2000'))
|
||||
|
|
|
@ -30,8 +30,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'References' => [
|
||||
['CVE', '2015-5477'],
|
||||
['URL', 'https://www.isc.org/blogs/cve-2015-5477-an-error-in-handling-tkey-queries-can-cause-named-to-exit-with-a-require-assertion-failure/'],
|
||||
['URL', 'https://kb.isc.org/article/AA-01272'],
|
||||
['URL', 'https://github.com/rapid7/metasploit-framework/issues/5790']
|
||||
['URL', 'https://kb.isc.org/article/AA-01272']
|
||||
],
|
||||
'DisclosureDate' => 'Jul 28 2015',
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -23,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://lists.immunitysec.com/pipermail/dailydave/2006-February/002982.html' ],
|
||||
[ 'BID', '16838' ],
|
||||
[ 'OSVDB', '23511' ],
|
||||
[ 'CVE', '2006-0900' ],
|
||||
|
|
|
@ -30,7 +30,6 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2014-0050'],
|
||||
['URL', 'http://markmail.org/message/kpfl7ax4el2owb3o'],
|
||||
['URL', 'http://tomcat.apache.org/security-8.html'],
|
||||
['URL', 'http://tomcat.apache.org/security-7.html']
|
||||
],
|
||||
|
|
|
@ -26,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['CVE', '2013-3843'],
|
||||
['OSVDB', '93853'],
|
||||
['BID', '60333'],
|
||||
['URL', 'http://bugs.monkey-project.com/ticket/182']
|
||||
['BID', '60333']
|
||||
],
|
||||
'DisclosureDate' => 'May 30 2013'))
|
||||
|
||||
|
|
|
@ -29,8 +29,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'CVE', '2005-4797' ],
|
||||
[ 'BID', '14510' ],
|
||||
[ 'OSVDB', '18650' ],
|
||||
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-26-101842-1'],
|
||||
[ 'OSVDB', '18650' ]
|
||||
]
|
||||
))
|
||||
|
||||
|
|
|
@ -28,8 +28,7 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-2686'],
|
||||
[ 'URL', 'https://www.openssl.org/news/secadv_20130205.txt']
|
||||
[ 'CVE', '2012-2686']
|
||||
],
|
||||
'DisclosureDate' => 'Feb 05 2013'))
|
||||
|
||||
|
|
|
@ -19,10 +19,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => ["Sil3nt_Dre4m"],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://kaillerahacks.blogspot.com/2011/07/kaillera-server-086-dos-vulnerability.html' ]
|
||||
],
|
||||
'DisclosureDate' => 'Jul 2 2011'))
|
||||
|
||||
register_options([
|
||||
|
|
|
@ -22,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '50617' ],
|
||||
[ 'BID', '5817' ],
|
||||
[ 'URL', 'http://sh0dan.org/oldfiles/hackingcitrix.html' ],
|
||||
[ 'BID', '5817' ]
|
||||
]
|
||||
))
|
||||
|
||||
|
|
|
@ -23,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' => [
|
||||
['URL', 'http://304geeks.blogspot.com/2013/01/dns-scraping-for-corporate-av-detection.html'],
|
||||
['URL', 'http://www.rootsecure.net/content/downloads/pdf/dns_cache_snooping.pdf']
|
||||
['URL', 'http://304geeks.blogspot.com/2013/01/dns-scraping-for-corporate-av-detection.html']
|
||||
]))
|
||||
|
||||
register_options([
|
||||
|
|
|
@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '2014-6039' ],
|
||||
[ 'OSVDB', '114342' ],
|
||||
[ 'OSVDB', '114344' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_eventlog_info_disc.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Nov/12' ]
|
||||
],
|
||||
'DisclosureDate' => 'Nov 5 2014'))
|
||||
|
|
|
@ -70,8 +70,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['CWE', '425'],
|
||||
['CVE', '2013-6031'],
|
||||
['US-CERT-VU', '341526'],
|
||||
['URL', 'http://www.huaweidevice.co.in/Support/Downloads/'],
|
||||
['US-CERT-VU', '341526']
|
||||
],
|
||||
'DisclosureDate' => "Nov 11 2013" ))
|
||||
|
||||
|
|
|
@ -32,7 +32,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '2015-0072' ],
|
||||
[ 'OSVDB', '117876' ],
|
||||
[ 'MSB', 'MS15-018' ],
|
||||
[ 'URL', 'http://www.deusen.co.uk/items/insider3show.3362009741042107/'],
|
||||
[ 'URL', 'http://innerht.ml/blog/ie-uxss.html' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Feb/10' ]
|
||||
],
|
||||
|
|
|
@ -31,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '2014-4872' ],
|
||||
[ 'OSVDB', '112741' ],
|
||||
[ 'US-CERT-VU', '121036' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Oct/34' ]
|
||||
],
|
||||
'DisclosureDate' => 'Oct 7 2014'
|
||||
|
|
|
@ -35,8 +35,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '1999-0103' ], # Note, does not actually trigger a flood.
|
||||
[ 'URL', 'https://www.cert.be/pro/docs/chargensnmp-ddos-attacks-rise' ],
|
||||
[ 'URL', 'http://tools.ietf.org/html/rfc864' ],
|
||||
[ 'URL', 'http://tools.ietf.org/html/rfc864' ]
|
||||
],
|
||||
'DisclosureDate' => 'Feb 08 1996')
|
||||
|
||||
|
|
|
@ -14,8 +14,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Name' => 'DECT Call Scanner',
|
||||
'Description' => 'This module scans for active DECT calls',
|
||||
'Author' => [ 'DK <privilegedmode[at]gmail.com>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' => [ ['URL', 'http://www.dedected.org'] ]
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
end
|
||||
|
||||
|
|
|
@ -14,8 +14,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Name' => 'DECT Base Station Scanner',
|
||||
'Description' => 'This module scans for DECT base stations',
|
||||
'Author' => [ 'DK <privilegedmode[at]gmail.com>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' => [ ['URL', 'http://www.dedected.org'] ]
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
||||
end
|
||||
|
|
|
@ -35,7 +35,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'BID', '2936'],
|
||||
[ 'CVE', '2001-0537'],
|
||||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20010627-ios-http-level.shtml'],
|
||||
[ 'OSVDB', '578' ],
|
||||
],
|
||||
'DisclosureDate' => 'Jun 27 2001'))
|
||||
|
|
|
@ -21,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2011-3305' ],
|
||||
[ 'OSVDB', '76080'],
|
||||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ]
|
||||
[ 'OSVDB', '76080']
|
||||
],
|
||||
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -39,7 +39,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '2010-2861' ],
|
||||
[ 'BID', '42342' ],
|
||||
[ 'OSVDB', '67047' ],
|
||||
[ 'URL', 'http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-07' ],
|
||||
[ 'URL', 'http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861' ],
|
||||
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb10-18.html' ],
|
||||
]
|
||||
|
|
|
@ -25,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
['OSVDB', '70762'],
|
||||
['CVE', '2011-0049'],
|
||||
['CVE', '2011-0063'],
|
||||
['URL', 'https://sitewat.ch/en/Advisory/View/1'],
|
||||
['URL', 'http://sotiriu.de/adv/NSOADV-2011-003.txt'],
|
||||
['EDB', '16103']
|
||||
],
|
||||
|
|
|
@ -23,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '80262'],
|
||||
[ 'URL', 'http://retrogod.altervista.org/9sg_me_adv.htm' ]
|
||||
[ 'OSVDB', '80262']
|
||||
],
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -23,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'OSVDB', '86881' ],
|
||||
[ 'BID', '57969' ],
|
||||
[ 'EDB', '24504' ],
|
||||
[ 'URL', 'http://www.tp-link.com/en/support/download/?model=TL-WA701ND&version=V1' ],
|
||||
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-011' ]
|
||||
],
|
||||
'Author' => [ 'Michael Messner <devnull[at]s3cur1ty.de>' ],
|
||||
|
|
|
@ -18,10 +18,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Description' => %q{
|
||||
Enumerate Poison Ivy Command and Control (C&C) on ports 3460, 80, 8080 and 443. Adaptation of iTrust Python script.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'www.malware.lu/Pro/RAP002_APT1_Technical_backstage.1.0.pdf'],
|
||||
],
|
||||
'Author' => ['SeawolfRN'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
|
|
@ -23,10 +23,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
The protocol deisgn issue also allows attackers to reset passwords on the device.
|
||||
},
|
||||
'Author' => 'Ben Schmidt',
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://spareclockcycles.org/exploiting-an-ip-camera-control-protocol/' ],
|
||||
],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
||||
|
|
|
@ -30,8 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'CVE', '2012-2215' ],
|
||||
[ 'OSVDB', '80230' ],
|
||||
[ 'URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=975' ],
|
||||
[ 'URL', 'http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html' ]
|
||||
[ 'URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=975' ]
|
||||
]
|
||||
))
|
||||
|
||||
|
|
|
@ -18,11 +18,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
must match the rogue_send parameters used exactly.
|
||||
},
|
||||
'Author' => 'hdm',
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://www.metasploit.com/research/projects/rogue_network/'],
|
||||
]
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
||||
register_options([
|
||||
|
|
|
@ -21,11 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
system is using as its default route.
|
||||
},
|
||||
'Author' => 'hdm',
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://www.metasploit.com/research/projects/rogue_network/'],
|
||||
]
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
||||
register_options([
|
||||
|
|
|
@ -37,7 +37,6 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'References' => [
|
||||
[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ],
|
||||
[ 'URL', 'http://help.sap.com/saphelp_nw70ehp3/helpdata/en/48/6c68b01d5a350ce10000000a42189d/content.htm'],
|
||||
[ 'URL', 'http://www.onapsis.com/research-free-solutions.php' ], # Bizsploit Opensource ERP Pentesting Framework
|
||||
[ 'URL', 'http://conference.hitb.org/hitbsecconf2010ams/materials/D2T2%20-%20Mariano%20Nunez%20Di%20Croce%20-%20SAProuter%20.pdf' ]
|
||||
],
|
||||
'Author' =>
|
||||
|
|
|
@ -22,10 +22,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
Simply address any of the TODOs.
|
||||
),
|
||||
'Author' => 'Joe Contributor <joe_contributor[at]example.com>',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://example.com/~jcontributor']
|
||||
],
|
||||
'DisclosureDate' => 'Mar 15 2014',
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
|
|
@ -47,7 +47,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' => [
|
||||
['CVE', '2015-1793'],
|
||||
['CWE', '754'],
|
||||
['URL', 'http://www.openssl.org/news/secadv_20150709.txt'],
|
||||
['URL', 'http://git.openssl.org/?p=openssl.git;a=commit;h=f404943bcab4898d18f3ac1b36479d1d7bbbb9e6']
|
||||
],
|
||||
'DisclosureDate' => 'Jul 9 2015'
|
||||
|
|
|
@ -24,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-3996' ],
|
||||
[ 'OSVDB', '49321'],
|
||||
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-08.shtml'],
|
||||
[ 'OSVDB', '49321']
|
||||
],
|
||||
'DisclosureDate' => 'Oct 22 2008'))
|
||||
|
||||
|
|
|
@ -25,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-3995' ],
|
||||
[ 'OSVDB', '49320'],
|
||||
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-09.shtml' ],
|
||||
[ 'OSVDB', '49320']
|
||||
],
|
||||
'DisclosureDate' => 'Oct 22 2008'))
|
||||
|
||||
|
|
|
@ -23,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'CVE', '2008-3982'],
|
||||
[ 'OSVDB', '49324'],
|
||||
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ],
|
||||
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
|
||||
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ]
|
||||
],
|
||||
'DisclosureDate' => 'Oct 13 2008'))
|
||||
|
||||
|
|
|
@ -26,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '2007-5511'],
|
||||
[ 'OSVDB', '40079'],
|
||||
[ 'BID', '26098' ],
|
||||
[ 'URL', 'http://rawlab.mindcreations.com/codes/exp/oracle/sys-lt-findricsetV2.sql'],
|
||||
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2007.html'],
|
||||
],
|
||||
'DisclosureDate' => 'Oct 17 2007'))
|
||||
|
|
|
@ -24,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'CVE', '2008-3983'],
|
||||
[ 'OSVDB', '49325'],
|
||||
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ],
|
||||
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
|
||||
[ 'URL', 'http://www.dsecrg.com/pages/expl/show.php?id=23' ]
|
||||
|
||||
],
|
||||
|
|
|
@ -22,9 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-3984' ],
|
||||
[ 'OSVDB', '49326'],
|
||||
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
|
||||
|
||||
[ 'OSVDB', '49326']
|
||||
],
|
||||
'DisclosureDate' => 'Oct 13 2008'))
|
||||
|
||||
|
|
|
@ -22,8 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2001-0800'],
|
||||
['OSVDB', '8573'],
|
||||
['URL', 'http://www.lsd-pl.net/code/IRIX/irx_lpsched.c'],
|
||||
['OSVDB', '8573']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => %w{ irix unix },
|
||||
|
|
|
@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['EDB', '36577'],
|
||||
['URL', 'http://www.bmicrosystems.com/blog/exploiting-the-airties-air-series/'], #advisory
|
||||
['URL', 'http://www.bmicrosystems.com/exploits/airties5650tt.txt'] #PoC
|
||||
],
|
||||
'Targets' =>
|
||||
|
|
|
@ -24,9 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2006-1148'],
|
||||
['OSVDB', '23777'],
|
||||
['BID', '17040'],
|
||||
['URL', 'http://www.infigo.hr/in_focus/INFIGO-2006-03-01'],
|
||||
|
||||
['BID', '17040']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2011-4828'],
|
||||
['OSVDB', '77183'],
|
||||
['BID', '50706'],
|
||||
['URL', 'http://bugs.v-cms.org/view.php?id=53'],
|
||||
['URL', 'http://xforce.iss.net/xforce/xfdb/71358']
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -33,8 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['OSVDB', '85344'],
|
||||
['OSVDB', '85345'],
|
||||
['URL', 'http://itsecuritysolutions.org/2012-08-12-wanem-v2.3-multiple-vulnerabilities/']
|
||||
['OSVDB', '85345']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2005-3252'],
|
||||
['OSVDB', '20034'],
|
||||
['BID', '15131'],
|
||||
['URL','http://xforce.iss.net/xforce/alerts/id/207'] ,
|
||||
['BID', '15131']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -50,8 +50,7 @@ class Metasploit4 < Msf::Exploit::Local
|
|||
[
|
||||
[ 'CVE', '2009-2692' ],
|
||||
[ 'OSVDB', '56992' ],
|
||||
[ 'URL', 'http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html' ],
|
||||
[ 'URL', 'http://www.grsecurity.net/~spender/wunderbar_emporium2.tgz' ],
|
||||
[ 'URL', 'http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html' ]
|
||||
],
|
||||
'Targets' =>
|
||||
[
|
||||
|
|
|
@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2011-0923'],
|
||||
[ 'OSVDB', '72526'],
|
||||
[ 'ZDI', '11-055'],
|
||||
[ 'URL', 'http://c4an-dl.blogspot.com/hp-data-protector-vuln.html'],
|
||||
[ 'URL', 'http://hackarandas.com/blog/2011/08/04/hp-data-protector-remote-shell-for-hpux'],
|
||||
[ 'URL', 'https://community.rapid7.com/thread/2253' ]
|
||||
],
|
||||
|
|
|
@ -47,8 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'BID', '37943' ],
|
||||
[ 'BID', '37974' ],
|
||||
[ 'OSVDB', '61956' ],
|
||||
[ 'URL', 'http://secunia.com/advisories/38344/' ],
|
||||
[ 'URL', 'http://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.html' ]
|
||||
[ 'URL', 'http://secunia.com/advisories/38344/' ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2015-0936'],
|
||||
['URL', 'https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15'], # Original Disclosure
|
||||
['URL', 'https://hdm.io/blog/2015/01/20/partial-disclosure-is-annoying'] # Related issue with hardcoded user:pass
|
||||
],
|
||||
'DisclosureDate' => "Apr 01 2015", # Not a joke
|
||||
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },
|
||||
|
|
|
@ -31,7 +31,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2012-3579'],
|
||||
['OSVDB', '85028'],
|
||||
['BID', '55143'],
|
||||
['URL', 'https://www.sec-consult.com/files/20120829-0_Symantec_Mail_Gateway_Support_Backdoor.txt'],
|
||||
['URL', 'http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20120827_00']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -37,8 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'OSVDB', '50500'],
|
||||
[ 'URL', 'http://slightlyrandombrokenthoughts.blogspot.com/2008/12/calendar-bug.html' ],
|
||||
[ 'URL', 'http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html' ],
|
||||
[ 'URL', 'http://blog.cr0.org/2009/05/write-once-own-everyone.html' ],
|
||||
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-26-244991-1' ]
|
||||
[ 'URL', 'http://blog.cr0.org/2009/05/write-once-own-everyone.html' ]
|
||||
],
|
||||
'Platform' => %w{ linux osx solaris win },
|
||||
'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },
|
||||
|
|
|
@ -41,8 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2009-3869' ],
|
||||
[ 'OSVDB', '59710' ],
|
||||
[ 'BID', '36881' ],
|
||||
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1' ],
|
||||
[ 'ZDI', '09-078' ],
|
||||
[ 'ZDI', '09-078' ]
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -38,9 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Author' => [ 'natron' ],
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-valsmith-metaphish.pdf' ],
|
||||
# list of trusted Certificate Authorities by java version
|
||||
[ 'URL', 'http://www.spikezilla-software.com/blog/?p=21' ]
|
||||
[ 'URL', 'http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-valsmith-metaphish.pdf' ]
|
||||
],
|
||||
'Platform' => %w{ java linux osx solaris win },
|
||||
'Payload' => { 'BadChars' => '', 'DisableNops' => true },
|
||||
|
|
|
@ -41,8 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2006-3677'],
|
||||
['OSVDB', '27559'],
|
||||
['BID', '19192'],
|
||||
['URL', 'http://www.mozilla.org/security/announce/mfsa2006-45.html'],
|
||||
['URL', 'http://browserfun.blogspot.com/2006/07/mobb-28-mozilla-navigator-object.html'],
|
||||
['URL', 'http://www.mozilla.org/security/announce/mfsa2006-45.html']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -45,7 +45,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'CVE', '2014-3996' ],
|
||||
[ 'OSVDB', '110198' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/me_dc_pmp_it360_sqli.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Aug/55' ]
|
||||
],
|
||||
'Arch' => ARCH_X86,
|
||||
|
|
|
@ -35,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2014-5301'],
|
||||
['OSVDB', '116733'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_sd_file_upload.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/5']
|
||||
],
|
||||
'DefaultOptions' => { 'WfsDelay' => 30 },
|
||||
|
|
|
@ -24,8 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2012-0261'],
|
||||
['OSVDB', '78064'],
|
||||
['URL', 'http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf'],
|
||||
['URL', 'http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/'],
|
||||
['URL', 'http://secunia.com/advisories/47417/'],
|
||||
],
|
||||
'Privileged' => true,
|
||||
|
|
|
@ -24,8 +24,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2012-0262'],
|
||||
['OSVDB', '78065'],
|
||||
['URL', 'http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf'],
|
||||
['URL', 'http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/'],
|
||||
['URL', 'http://secunia.com/advisories/47417/'],
|
||||
],
|
||||
'Privileged' => true,
|
||||
|
|
|
@ -29,7 +29,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'CVE', '2014-6034' ],
|
||||
[ 'OSVDB', '112276' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Sep/110' ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
|
|
|
@ -41,8 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ "CVE", "2012-3153" ],
|
||||
[ "OSVDB", "86395" ], # Matches CVE-2012-3152
|
||||
[ "OSVDB", "86394" ], # Matches CVE-2012-3153
|
||||
[ "EDB", "31253" ],
|
||||
[ 'URL', "http://netinfiltration.com" ]
|
||||
[ "EDB", "31253" ]
|
||||
],
|
||||
'Stance' => Msf::Exploit::Stance::Aggressive,
|
||||
'Platform' => ['win', 'linux'],
|
||||
|
|
|
@ -32,8 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2011-4075'],
|
||||
['OSVDB', '76594'],
|
||||
['BID', '50331'],
|
||||
['URL', 'http://sourceforge.net/support/tracker.php?aid=3417184'],
|
||||
['EDB', '18021'],
|
||||
['EDB', '18021']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -113,7 +113,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://charlie.bz/blog/rails-3.2.10-remote-code-execution'], #Initial exploit vector was taken from here
|
||||
['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/']
|
||||
],
|
||||
'DisclosureDate' => 'Apr 11 2013',
|
||||
|
|
|
@ -35,9 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'BID', '51061' ],
|
||||
[ 'CVE', '2011-4642' ],
|
||||
[ 'URL', 'http://www.splunk.com/view/SP-CAAAGMM' ],
|
||||
[ 'URL', 'http://www.sec-1.com/blog/?p=233' ],
|
||||
[ 'URL', 'http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf' ],
|
||||
[ 'URL', 'http://www.sec-1.com/blog/wp-content/uploads/2011/12/splunkexploit.zip' ]
|
||||
[ 'URL', 'http://www.sec-1.com/blog/?p=233' ]
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -36,8 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'CVE', '2012-0391'],
|
||||
[ 'OSVDB', '78277'],
|
||||
[ 'EDB', '18329'],
|
||||
[ 'URL', 'https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt']
|
||||
[ 'EDB', '18329']
|
||||
],
|
||||
'Platform' => %w{ java linux win },
|
||||
'Privileged' => true,
|
||||
|
|
|
@ -35,8 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2012-0394'],
|
||||
[ 'OSVDB', '78276'],
|
||||
[ 'EDB', '18329'],
|
||||
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt' ],
|
||||
[ 'URL', 'http://www.pwntester.com/blog/2014/01/21/struts-2-devmode/' ]
|
||||
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt' ]
|
||||
],
|
||||
'Platform' => 'java',
|
||||
'Arch' => ARCH_JAVA,
|
||||
|
|
|
@ -32,9 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2010-0361' ],
|
||||
[ 'OSVDB', '61851' ],
|
||||
[ 'URL', 'http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html' ],
|
||||
[ 'URL', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-275850-1' ]
|
||||
[ 'OSVDB', '61851' ]
|
||||
],
|
||||
'Platform' => [ 'win' ],
|
||||
'Privileged' => true,
|
||||
|
|
|
@ -32,7 +32,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2015-2994'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jun/8']
|
||||
],
|
||||
'DefaultOptions' => { 'WfsDelay' => 5 },
|
||||
|
|
|
@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2015-2995' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Jun/8' ]
|
||||
],
|
||||
'DefaultOptions' => { 'WfsDelay' => 30 },
|
||||
|
|
|
@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['OSVDB', '78508'],
|
||||
['BID', '51647'],
|
||||
['URL', 'http://www.vbseo.com/f5/vbseo-security-bulletin-all-supported-versions-patch-release-52783/'],
|
||||
['EDB', '18424']
|
||||
],
|
||||
'Privileged' => false,
|
||||
|
|
|
@ -33,8 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2011-4451'],
|
||||
['OSVDB', '77393'],
|
||||
['EDB', '18177'],
|
||||
['URL', 'http://wush.net/trac/wikka/ticket/1098']
|
||||
['EDB', '18177']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -33,7 +33,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2015-0779'],
|
||||
['OSVDB', '120382'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Apr/21']
|
||||
],
|
||||
'DefaultOptions' => { 'WfsDelay' => 30 },
|
||||
|
|
|
@ -34,7 +34,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'OSVDB', '84913' ],
|
||||
[ 'EDB', '20168' ],
|
||||
[ 'URL', 'http://offensivecomputing.net/?q=node/1417'],
|
||||
[ 'URL', 'http://resources.infosecinstitute.com/pbot-analysis/']
|
||||
],
|
||||
'Platform' => %w{ unix win },
|
||||
|
|
|
@ -26,9 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'CVE', '2004-1389' ],
|
||||
[ 'OSVDB', '11026' ],
|
||||
[ 'BID', '11494' ],
|
||||
[ 'URL', 'http://seer.support.veritas.com/docs/271727.htm' ],
|
||||
|
||||
[ 'BID', '11494' ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Platform' => %w{ linux unix win },
|
||||
|
|
|
@ -24,8 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2002-1643' ],
|
||||
[ 'OSVDB', '4468'],
|
||||
[ 'URL', 'http://lists.immunitysec.com/pipermail/dailydave/2003-August/000030.html']
|
||||
[ 'OSVDB', '4468']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Payload' =>
|
||||
|
|
|
@ -41,9 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2013-1428'],
|
||||
['OSVDB', '92653'],
|
||||
['BID', '59369'],
|
||||
['URL', 'http://www.floyd.ch/?p=741'],
|
||||
['URL', 'http://sitsec.net/blog/2013/04/22/stack-based-buffer-overflow-in-the-vpn-software-tinc-for-authenticated-peers/'],
|
||||
['URL', 'http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1428']
|
||||
['URL', 'http://www.floyd.ch/?p=741']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -31,9 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '55839'],
|
||||
['US-CERT-VU', '654545'],
|
||||
['URL', 'http://snosoft.blogspot.com/'],
|
||||
['URL', 'http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/'],
|
||||
['URL', 'http://www.wyse.com/serviceandsupport/support/WSB09-01.zip'],
|
||||
['URL', 'http://www.wyse.com/serviceandsupport/Wyse%20Security%20Bulletin%20WSB09-01.pdf'],
|
||||
['URL', 'http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Payload' =>
|
||||
|
|
|
@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'CVE', '2005-0491'],
|
||||
[ 'OSVDB', '14011'],
|
||||
[ 'BID', '12594'],
|
||||
[ 'URL', 'http://lists.netsys.com/pipermail/full-disclosure/2005-February/031831.html'],
|
||||
[ 'BID', '12594']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Payload' =>
|
||||
|
|
|
@ -27,8 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2003-0722'],
|
||||
['OSVDB', '4585'],
|
||||
['BID', '8615'],
|
||||
['URL', 'http://lists.insecure.org/lists/vulnwatch/2003/Jul-Sep/0115.html'],
|
||||
['BID', '8615']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Platform' => %w{ solaris unix },
|
||||
|
|
|
@ -23,8 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '69562'],
|
||||
[ 'BID', '45150' ],
|
||||
[ 'URL', 'http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org' ],
|
||||
[ 'BID', '45150' ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Platform' => [ 'unix' ],
|
||||
|
|
|
@ -32,8 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2012-5975'],
|
||||
['EDB', '23082'],
|
||||
['OSVDB', '88103'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12'],
|
||||
['URL', 'http://www.ssh.com/index.php/component/content/article/531.html']
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2008-3922'],
|
||||
['OSVDB', '47807'],
|
||||
['BID', '30856'],
|
||||
['URL', 'http://userwww.service.emory.edu/~ekenda2/EMORY-2008-01.txt'],
|
||||
['BID', '30856']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -25,8 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2005-2847'],
|
||||
['OSVDB', '19279'],
|
||||
['BID', '14712'],
|
||||
['URL', 'http://www.nessus.org/plugins/index.php?view=single&id=19556'],
|
||||
['URL', 'http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1'],
|
||||
['URL', 'http://www.nessus.org/plugins/index.php?view=single&id=19556']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -21,8 +21,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
|
||||
['URL', 'http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-14'],
|
||||
['OSVDB', '69934'],
|
||||
# ['CVE', ''],
|
||||
# ['BID', '']
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue