From 0037ccceed4661335ab01388ae59a46f4d6b659e Mon Sep 17 00:00:00 2001 From: Steve Tornio Date: Sun, 18 Aug 2013 06:34:50 -0500 Subject: [PATCH 1/2] add osvdb ref for openx backdoor --- modules/exploits/multi/http/openx_backdoor_php.rb | 1 + 1 file changed, 1 insertion(+) diff --git a/modules/exploits/multi/http/openx_backdoor_php.rb b/modules/exploits/multi/http/openx_backdoor_php.rb index 7261bd7372..c677c5134b 100644 --- a/modules/exploits/multi/http/openx_backdoor_php.rb +++ b/modules/exploits/multi/http/openx_backdoor_php.rb @@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote 'License' => MSF_LICENSE, 'References' => [ [ 'CVE', '2013-4211' ], + [ 'OSVDB', '96073' ], [ 'URL', 'http://www.heise.de/security/meldung/Achtung-Anzeigen-Server-OpenX-enthaelt-eine-Hintertuer-1929769.html'], [ 'URL', 'http://forum.openx.org/index.php?showtopic=503521628'], ], From abd4fb778fa3e4c0e523d5c687de73c6ac037712 Mon Sep 17 00:00:00 2001 From: Steve Tornio Date: Sun, 18 Aug 2013 06:35:28 -0500 Subject: [PATCH 2/2] add osvdb ref for chasys overflow --- modules/exploits/windows/fileformat/chasys_draw_ies_bmp_bof.rb | 1 + 1 file changed, 1 insertion(+) diff --git a/modules/exploits/windows/fileformat/chasys_draw_ies_bmp_bof.rb b/modules/exploits/windows/fileformat/chasys_draw_ies_bmp_bof.rb index 2e5d132e8b..b08f9eecb8 100644 --- a/modules/exploits/windows/fileformat/chasys_draw_ies_bmp_bof.rb +++ b/modules/exploits/windows/fileformat/chasys_draw_ies_bmp_bof.rb @@ -35,6 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'CVE', '2013-3928' ], + [ 'OSVDB', '95689' ], [ 'BID', '61463' ], [ 'URL', 'http://secunia.com/advisories/53773/' ], [ 'URL', 'http://longinox.blogspot.com/2013/08/explot-stack-based-overflow-bypassing.html' ]