parent
f9ac55c221
commit
5b18a34ad4
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2012-0013'],
|
||||
['OSVDB', '78207'],
|
||||
['MSB', 'ms12-005'],
|
||||
['MSB', 'MS12-005'],
|
||||
['BID', '51284'],
|
||||
['URL', 'http://support.microsoft.com/default.aspx?scid=kb;EN-US;2584146'],
|
||||
['URL', 'http://exploitshop.wordpress.com/2012/01/14/ms12-005-embedded-object-package-allow-arbitrary-code-execution/']
|
||||
|
|
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '14502'],
|
||||
['BID', '6214'],
|
||||
['CVE', '2002-1142'],
|
||||
['MSB', 'ms02-065'],
|
||||
['MSB', 'MS02-065'],
|
||||
['URL', 'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0082.html']
|
||||
],
|
||||
'Privileged' => false,
|
||||
|
|
|
@ -42,8 +42,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '272'],
|
||||
['BID', '529'],
|
||||
['CVE', '1999-1011'],
|
||||
['MSB', 'ms98-004'],
|
||||
['MSB', 'ms99-025']
|
||||
['MSB', 'MS98-004'],
|
||||
['MSB', 'MS99-025']
|
||||
],
|
||||
'Targets' =>
|
||||
[
|
||||
|
|
|
@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
'Targets' => [ [ 'Windows', {} ] ],
|
||||
'DefaultTarget' => 0,
|
||||
'References' => [
|
||||
[ 'URL', ' http://www.trustedsec.com/december-2010/bypass-windows-uac/' ]
|
||||
[ 'URL', 'http://www.trustedsec.com/december-2010/bypass-windows-uac/' ]
|
||||
],
|
||||
'DisclosureDate'=> "Dec 31 2010"
|
||||
))
|
||||
|
|
|
@ -28,7 +28,7 @@ class Metasploit3 < Msf::Post
|
|||
'Platform' => [ 'windows' ],
|
||||
'SessionTypes' => [ 'meterpreter' ],
|
||||
'References' => [
|
||||
[ 'URL', ' http://www.trustedsec.com/december-2010/bypass-windows-uac/' ]
|
||||
[ 'URL', 'http://www.trustedsec.com/december-2010/bypass-windows-uac/' ]
|
||||
],
|
||||
'DisclosureDate'=> "Dec 31 2010"
|
||||
))
|
||||
|
|
Loading…
Reference in New Issue