added refs. I think all the auxiliary and exploit modules should now be covered.

git-svn-id: file:///home/svn/framework3/trunk@9298 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Steve Tornio 2010-05-13 16:53:50 +00:00
parent 084a6e971c
commit 365f13551b
27 changed files with 33 additions and 4 deletions

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-6166' ],
[ 'OSVDB', '40876'],
[ 'BID', '26549' ],
],
'Payload' =>

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-2685' ],
[ 'OSVDB', '49366'],
[ 'BID', '18298' ],
],
'Privileged' => false,

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '64578'],
['URL', 'http://milw0rm.com/exploits/9296'],
['URL', 'http://developer.joomla.org/security/news/301-20090722-core-file-upload.html'],
],

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-2905' ],
[ 'OSVDB', '46173' ],
[ 'BID', '29716' ],
],
'Privileged' => false,

View File

@ -28,8 +28,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '34674' ],
[ 'CVE', '2009-1430' ],
[ 'OSVDB', '54159'],
[ 'BID', '34674' ],
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2010-0103'],
['OSVDB', '62782'],
['URL', 'http://www.kb.cert.org/vuls/id/154421']
],
'Platform' => 'win',

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-5650' ],
[ 'OSVDB', '30220'],
[ 'BID', '20930' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-06-037/' ],
],

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-4466' ],
[ 'OSVDB', '37723'],
],
'DefaultOptions' =>
{

View File

@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-3704' ],
[ 'BID','30674' ],
[ 'OSVDB', '47475'],
[ 'BID', '30674' ],
],
'DefaultOptions' =>
{

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '64579'],
[ 'URL', 'http://www.activepdf.com/products/serverproducts/webgrabber/' ],
],
'DefaultOptions' =>

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE' , '2006-6199' ],
[ 'OSVDB', '30770'],
[ 'BID', '35918' ],
],
'DefaultOptions' =>

View File

@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-2864' ],
[ 'OSVDB', '35245'],
[ 'BID', '24330' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-07-035.html' ],
[ 'CVE', '2007-2864' ],
],
'DefaultOptions' =>
{

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '58423'],
[ 'BID', '36546' ],
],
'DefaultOptions' =>

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-4225' ],
[ 'OSVDB', '60862'],
[ 'URL', 'http://www.my-etrust.com/Extern/RoadRunner/PestScan/scan.htm' ],
],
'DefaultOptions' =>

View File

@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-0564'],
[ 'OSVDB', '22941'],
[ 'URL', 'http://www.exploit-db.com/exploits/1488' ],
[ 'URL', 'http://www.exploit-db.com/exploits/1490' ],
],

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-4776' ],
[ 'OSVDB', '36936'],
[ 'BID', '25629' ],
],
'DefaultOptions' =>

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '64580'],
[ 'URL', 'http://www.exploit-db.com/exploits/11791' ],
],
'DefaultOptions' =>

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '64581'],
[ 'BID', '33960' ],
],
'DefaultOptions' =>

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-6251' ],
[ 'OSVDB', '31710' ],
],
'DefaultOptions' =>
{

View File

@ -32,8 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['URL', 'http://milw0rm.com/exploits/9541'],
['BID', '36189'],
['CVE', '2009-3023'],
['OSVDB', '57589'],
['BID', '36189'],
],
'DefaultOptions' =>
{

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-3068' ],
[ 'OSVDB', '57896'],
[ 'URL', 'www.intevydis.com/blog/?p=69' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-066' ],
],

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-2685' ],
[ 'OSVDB', '59684'],
],
'DefaultOptions' =>
{

View File

@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-1914'],
[ 'OSVDB', '44454'],
[ 'URL', 'http://www.exploit-db.com/exploits/9673' ],
[ 'URL', 'http://www.exploit-db.com/exploits/9690' ]

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-1029' ],
[ 'OSVDB', '53560'],
[ 'BID', '34093' ],
[ 'URL', 'http://www.krakowlabs.com/res/adv/KL0209ADV-poppeeper_date-bof.txt' ],
],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '53559'],
[ 'BID', '33926' ],
[ 'URL', 'http://www.krakowlabs.com/res/adv/KL0209ADV-poppeeper_uidl-bof.txt' ],
],

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '64582'],
[ 'BID', '34141' ],
[ 'URL', 'http://milw0rm.com/exploits/8227' ],
],

View File

@ -59,6 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
[ 'OSVDB', '3106'],
[ 'URL', 'http://www.microsoft.com/technet/sysinternals/utilities/psexec.mspx' ]
],
'Payload' =>