reference updates
parent
97ab9fa8df
commit
5b71013dde
|
@ -36,8 +36,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2011-4786'],
|
||||
[ 'BID', '51396'],
|
||||
[ 'CVE', '2011-4786' ],
|
||||
[ 'OSVDB', '78306' ],
|
||||
[ 'BID', '51396' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-013/' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '78102' ],
|
||||
[ 'EDB', '15668' ],
|
||||
[ 'URL', 'http://secunia.com/advisories/42445/' ],
|
||||
[ 'URL', 'http://xforce.iss.net/xforce/xfdb/63666' ]
|
||||
|
|
|
@ -34,6 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '88191'],
|
||||
['EDB', '23225'],
|
||||
['URL', 'http://blog.malerisch.net/2012/12/maxthon-cross-context-scripting-xcs-about-history-rce.html']
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2011-2371'],
|
||||
['OSVDB', '73184'],
|
||||
['EDB', '17974'],
|
||||
['URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=664009']
|
||||
],
|
||||
|
|
|
@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2011-1996' ],
|
||||
[ 'OSVDB', '76208' ],
|
||||
[ 'MSB', 'MS11-081' ],
|
||||
[ 'URL', 'http://ifsec.blogspot.com/2011/10/internet-explorer-option-element-remote.html' ],
|
||||
[ 'URL', 'http://pastebin.com/YLH725Aj' ]
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-0025' ],
|
||||
[ 'OSVDB', '90122' ],
|
||||
[ 'MSB', 'MS13-009' ],
|
||||
[ 'URL', 'http://security-assessment.com/files/documents/advisory/ie_slayoutrun_uaf.pdf' ]
|
||||
],
|
||||
|
|
|
@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-4915'],
|
||||
[ 'BID', '49795'],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/pcvue_1-adv.txt'],
|
||||
[ 'CVE', '2011-4044' ],
|
||||
[ 'OSVDB', '77561' ],
|
||||
[ 'BID', '49795' ],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/pcvue_1-adv.txt' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -25,7 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ],
|
||||
[ 'OSVDB', '68701' ],
|
||||
[ 'EDB', '16738' ],
|
||||
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-5357'],
|
||||
[ 'OSVDB', '88107' ],
|
||||
[ 'URL', 'http://webstersprodigy.net/2012/10/25/cve-2012-5357cve-1012-5358-cool-ektron-xslt-rce-bugs/' ],
|
||||
[ 'URL', 'http://technet.microsoft.com/en-us/security/msvr/msvr12-016' ]
|
||||
],
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2011-0266'],
|
||||
['OSVDB', '70473'],
|
||||
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-11-008/']
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -27,8 +27,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-118' ],
|
||||
[ 'CVE', '2010-0904' ],
|
||||
[ 'OSVDB', '66338' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-118' ]
|
||||
# the jlist vector has not been disclosed or has it?
|
||||
],
|
||||
'Targets' =>
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '83889' ],
|
||||
[ 'EDB', '19625' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-4959'],
|
||||
[ 'OSVDB', '87573' ],
|
||||
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959' ]
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
Loading…
Reference in New Issue