Land #2025 - More reference update

unstable
sinn3r 2013-06-25 13:49:14 -05:00
commit 86b0175773
13 changed files with 22 additions and 7 deletions

View File

@ -36,8 +36,9 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2011-4786'], [ 'CVE', '2011-4786' ],
[ 'BID', '51396'], [ 'OSVDB', '78306' ],
[ 'BID', '51396' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-013/' ], [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-013/' ],
], ],
'DefaultOptions' => 'DefaultOptions' =>

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'OSVDB', '78102' ],
[ 'EDB', '15668' ], [ 'EDB', '15668' ],
[ 'URL', 'http://secunia.com/advisories/42445/' ], [ 'URL', 'http://secunia.com/advisories/42445/' ],
[ 'URL', 'http://xforce.iss.net/xforce/xfdb/63666' ] [ 'URL', 'http://xforce.iss.net/xforce/xfdb/63666' ]

View File

@ -34,6 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
['OSVDB', '88191'],
['EDB', '23225'],
['URL', 'http://blog.malerisch.net/2012/12/maxthon-cross-context-scripting-xcs-about-history-rce.html'] ['URL', 'http://blog.malerisch.net/2012/12/maxthon-cross-context-scripting-xcs-about-history-rce.html']
], ],
'Payload' => 'Payload' =>

View File

@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
['CVE', '2011-2371'], ['CVE', '2011-2371'],
['OSVDB', '73184'],
['EDB', '17974'], ['EDB', '17974'],
['URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=664009'] ['URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=664009']
], ],

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2011-1996' ], [ 'CVE', '2011-1996' ],
[ 'OSVDB', '76208' ],
[ 'MSB', 'MS11-081' ], [ 'MSB', 'MS11-081' ],
[ 'URL', 'http://ifsec.blogspot.com/2011/10/internet-explorer-option-element-remote.html' ], [ 'URL', 'http://ifsec.blogspot.com/2011/10/internet-explorer-option-element-remote.html' ],
[ 'URL', 'http://pastebin.com/YLH725Aj' ] [ 'URL', 'http://pastebin.com/YLH725Aj' ]

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2013-0025' ], [ 'CVE', '2013-0025' ],
[ 'OSVDB', '90122' ],
[ 'MSB', 'MS13-009' ], [ 'MSB', 'MS13-009' ],
[ 'URL', 'http://security-assessment.com/files/documents/advisory/ie_slayoutrun_uaf.pdf' ] [ 'URL', 'http://security-assessment.com/files/documents/advisory/ie_slayoutrun_uaf.pdf' ]
], ],

View File

@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2008-4915'], [ 'CVE', '2011-4044' ],
[ 'BID', '49795'], [ 'OSVDB', '77561' ],
[ 'URL', 'http://aluigi.altervista.org/adv/pcvue_1-adv.txt'], [ 'BID', '49795' ],
[ 'URL', 'http://aluigi.altervista.org/adv/pcvue_1-adv.txt' ]
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {

View File

@ -25,7 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], [ 'OSVDB', '68701' ],
[ 'EDB', '16738' ],
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ]
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2012-5357'], [ 'CVE', '2012-5357'],
[ 'OSVDB', '88107' ],
[ 'URL', 'http://webstersprodigy.net/2012/10/25/cve-2012-5357cve-1012-5358-cool-ektron-xslt-rce-bugs/' ], [ 'URL', 'http://webstersprodigy.net/2012/10/25/cve-2012-5357cve-1012-5358-cool-ektron-xslt-rce-bugs/' ],
[ 'URL', 'http://technet.microsoft.com/en-us/security/msvr/msvr12-016' ] [ 'URL', 'http://technet.microsoft.com/en-us/security/msvr/msvr12-016' ]
], ],

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
['CVE', '2011-0266'], ['CVE', '2011-0266'],
['OSVDB', '70473'],
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-11-008/'] ['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-11-008/']
], ],
'Payload' => 'Payload' =>

View File

@ -27,8 +27,9 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-118' ],
[ 'CVE', '2010-0904' ], [ 'CVE', '2010-0904' ],
[ 'OSVDB', '66338' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-118' ]
# the jlist vector has not been disclosed or has it? # the jlist vector has not been disclosed or has it?
], ],
'Targets' => 'Targets' =>

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'OSVDB', '83889' ],
[ 'EDB', '19625' ] [ 'EDB', '19625' ]
], ],
'DefaultOptions' => 'DefaultOptions' =>

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'CVE', '2012-4959'], [ 'CVE', '2012-4959'],
[ 'OSVDB', '87573' ],
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959' ] [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959' ]
], ],
'Payload' => 'Payload' =>