Update CVE references for exploit modules

These are based on cross references by EDB, OSVDB, module short
name, blog post and BID.
GSoC/Meterpreter_Web_Console
Wei Chen 2018-07-08 18:46:04 -05:00
parent af3d2045fb
commit 5fc5a47cd2
21 changed files with 21 additions and 0 deletions

View File

@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2014-9727' ],
[ 'OSVDB', '103289' ],
[ 'BID', '65520' ],
[ 'URL', 'http://www.kapple.de/?p=75' ], # vulnerability details with PoC

View File

@ -111,6 +111,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2013-3709'],
['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/']
],
'DisclosureDate' => 'Apr 11 2013',

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2012-5223'],
['OSVDB', '78508'],
['BID', '51647'],
['EDB', '18424']

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2012-3399' ],
[ 'OSVDB', '83719' ],
[ 'BID', '54234' ]
],

View File

@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2009-4140' ],
[ 'OSVDB', '90222' ],
[ 'BID', '37314' ],
[ 'EBD', '24492' ],

View File

@ -41,6 +41,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2014-9308'],
['OSVDB', '116806'],
['WPVDB', '7745']
],

View File

@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2015-4133'],
['EDB', '36374'],
['OSVDB', '88853'],
['WPVDB', '7867']

View File

@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2013-7409' ],
[ 'BID', '62926' ],
[ 'BID', '63896' ],
[ 'EDB', '28855' ],

View File

@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'Jeremy Brown', 'MC' ],
'References' =>
[
[ 'CVE', '2010-4740' ],
[ 'OSVDB', '68096'],
[ 'BID', '43289' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf' ],

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => ['Rh0'], # discovery and metasploit module
'References' =>
[
['CVE', '2011-5170'],
['OSVDB', '77453'],
['EDB', '18178']
],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2011-5171'],
['BID', '50997'],
['OSVDB', '77600'],
['EDB', '18220'],

View File

@ -20,6 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'MC' ],
'References' =>
[
[ 'CVE', '2012-2515' ],
[ 'OSVDB', '58423'],
[ 'BID', '36546' ],
],

View File

@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2011-5165' ],
[ 'OSVDB', '63349' ],
[ 'EDB', '11975' ], #Initial disclosure
[ 'EDB', '17727' ] #This exploit is based on this poc

View File

@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'James Fitts <fitts.james[at]gmail.com>' ],
'References' =>
[
[ 'CVE', '2010-5299' ],
[ 'OSVDB', '73627'],
[ 'EDB', '14720' ],
],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2009-1330' ],
[ 'OSVDB', '78078' ],
[ 'EDB', '14373' ],
[ 'BID', '34514' ]

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2009-1641' ],
[ 'OSVDB', '81487' ],
[ 'EDB', '11957' ],
[ 'BID', '34864' ]

View File

@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-4730' ],
[ 'EDB', '37731'],
[ 'OSVDB', '94624']
],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-4730' ],
[ 'OSVDB', '94624'],
[ 'EDB', '27703']
],

View File

@ -26,6 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2012-2329' ],
[ 'OSVDB', '95819'],
[ 'BID', '53455'],
[ 'ZDI', '13-178' ],

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2010-5324' ],
[ 'OSVDB', '63412' ],
[ 'BID', '39114' ],
[ 'ZDI', '10-078' ],

View File

@ -49,6 +49,7 @@ class MetasploitModule < Msf::Exploit::Local
],
'References' =>
[
[ 'CVE', '2008-3158' ],
[ 'OSVDB', '46578' ],
[ 'BID', '30001' ]
],