Fix CVE numbers
parent
5fc5a47cd2
commit
4f039de2fc
|
@ -111,7 +111,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2013-3709'],
|
||||
['CVE', '2013-0156'],
|
||||
['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/']
|
||||
],
|
||||
'DisclosureDate' => 'Apr 11 2013',
|
||||
|
|
|
@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Name' => 'ALLPlayer M3U Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack-based buffer overflow vulnerability in
|
||||
ALLPlayer 2.8.1, caused by a long string in a playlist entry.
|
||||
ALLPlayer 5.8.1, caused by a long string in a playlist entry.
|
||||
By persuading the victim to open a specially-crafted .M3U file, a
|
||||
remote attacker could execute arbitrary code on the system or cause
|
||||
the application to crash. This module has been tested successfully on
|
||||
|
|
|
@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-1330' ],
|
||||
[ 'CVE', '2010-5081' ],
|
||||
[ 'OSVDB', '78078' ],
|
||||
[ 'EDB', '14373' ],
|
||||
[ 'BID', '34514' ]
|
||||
|
|
|
@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-2329' ],
|
||||
[ 'CVE', '2013-0680' ],
|
||||
[ 'OSVDB', '95819'],
|
||||
[ 'BID', '53455'],
|
||||
[ 'ZDI', '13-178' ],
|
||||
|
|
Loading…
Reference in New Issue