added refs. I think all the auxiliary and exploit modules should now be covered.
git-svn-id: file:///home/svn/framework3/trunk@9298 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
084a6e971c
commit
365f13551b
|
@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-6166' ],
|
||||
[ 'OSVDB', '40876'],
|
||||
[ 'BID', '26549' ],
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2006-2685' ],
|
||||
[ 'OSVDB', '49366'],
|
||||
[ 'BID', '18298' ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '64578'],
|
||||
['URL', 'http://milw0rm.com/exploits/9296'],
|
||||
['URL', 'http://developer.joomla.org/security/news/301-20090722-core-file-upload.html'],
|
||||
],
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-2905' ],
|
||||
[ 'OSVDB', '46173' ],
|
||||
[ 'BID', '29716' ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
|
|
|
@ -28,8 +28,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '34674' ],
|
||||
[ 'CVE', '2009-1430' ],
|
||||
[ 'OSVDB', '54159'],
|
||||
[ 'BID', '34674' ],
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2010-0103'],
|
||||
['OSVDB', '62782'],
|
||||
['URL', 'http://www.kb.cert.org/vuls/id/154421']
|
||||
],
|
||||
'Platform' => 'win',
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2006-5650' ],
|
||||
[ 'OSVDB', '30220'],
|
||||
[ 'BID', '20930' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-06-037/' ],
|
||||
],
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-4466' ],
|
||||
[ 'OSVDB', '37723'],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-3704' ],
|
||||
[ 'BID','30674' ],
|
||||
[ 'OSVDB', '47475'],
|
||||
[ 'BID', '30674' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '64579'],
|
||||
[ 'URL', 'http://www.activepdf.com/products/serverproducts/webgrabber/' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE' , '2006-6199' ],
|
||||
[ 'OSVDB', '30770'],
|
||||
[ 'BID', '35918' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-2864' ],
|
||||
[ 'OSVDB', '35245'],
|
||||
[ 'BID', '24330' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-07-035.html' ],
|
||||
[ 'CVE', '2007-2864' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '58423'],
|
||||
[ 'BID', '36546' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-4225' ],
|
||||
[ 'OSVDB', '60862'],
|
||||
[ 'URL', 'http://www.my-etrust.com/Extern/RoadRunner/PestScan/scan.htm' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2006-0564'],
|
||||
[ 'OSVDB', '22941'],
|
||||
[ 'URL', 'http://www.exploit-db.com/exploits/1488' ],
|
||||
[ 'URL', 'http://www.exploit-db.com/exploits/1490' ],
|
||||
],
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-4776' ],
|
||||
[ 'OSVDB', '36936'],
|
||||
[ 'BID', '25629' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '64580'],
|
||||
[ 'URL', 'http://www.exploit-db.com/exploits/11791' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '64581'],
|
||||
[ 'BID', '33960' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2006-6251' ],
|
||||
[ 'OSVDB', '31710' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -32,8 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['URL', 'http://milw0rm.com/exploits/9541'],
|
||||
['BID', '36189'],
|
||||
['CVE', '2009-3023'],
|
||||
['OSVDB', '57589'],
|
||||
['BID', '36189'],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-3068' ],
|
||||
[ 'OSVDB', '57896'],
|
||||
[ 'URL', 'www.intevydis.com/blog/?p=69' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-066' ],
|
||||
],
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-2685' ],
|
||||
[ 'OSVDB', '59684'],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-1914'],
|
||||
[ 'OSVDB', '44454'],
|
||||
[ 'URL', 'http://www.exploit-db.com/exploits/9673' ],
|
||||
[ 'URL', 'http://www.exploit-db.com/exploits/9690' ]
|
||||
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-1029' ],
|
||||
[ 'OSVDB', '53560'],
|
||||
[ 'BID', '34093' ],
|
||||
[ 'URL', 'http://www.krakowlabs.com/res/adv/KL0209ADV-poppeeper_date-bof.txt' ],
|
||||
],
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '53559'],
|
||||
[ 'BID', '33926' ],
|
||||
[ 'URL', 'http://www.krakowlabs.com/res/adv/KL0209ADV-poppeeper_uidl-bof.txt' ],
|
||||
],
|
||||
|
|
|
@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '64582'],
|
||||
[ 'BID', '34141' ],
|
||||
[ 'URL', 'http://milw0rm.com/exploits/8227' ],
|
||||
],
|
||||
|
|
|
@ -59,6 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
|
||||
[ 'OSVDB', '3106'],
|
||||
[ 'URL', 'http://www.microsoft.com/technet/sysinternals/utilities/psexec.mspx' ]
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
Loading…
Reference in New Issue