More osvdb references from Steve Tornio
git-svn-id: file:///home/svn/framework3/trunk@6550 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
6e84b4ea7f
commit
9d8581a17e
|
@ -18,6 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$ Revision: 1.0 $',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2004-1388' ],
|
||||
[ 'OSVDB', '13199' ],
|
||||
[ 'BID', '12371' ],
|
||||
[ 'URL', 'http://www.securiteam.com/unixfocus/5LP0M1PEKK.html'],
|
||||
|
||||
],
|
||||
|
|
|
@ -38,8 +38,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['BID', '23608'],
|
||||
['CVE', '2007-2175'],
|
||||
['OSVDB', '34178'],
|
||||
['BID', '23608'],
|
||||
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-07-023.html'],
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '10271'],
|
||||
[ 'CVE', '2004-0430'],
|
||||
[ 'OSVDB', '5762'],
|
||||
[ 'BID', '10271'],
|
||||
[ 'MIL', '2'],
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2005-0491'],
|
||||
[ 'OSVDB', '14011'],
|
||||
[ 'BID', '12594'],
|
||||
[ 'URL', 'http://lists.netsys.com/pipermail/full-disclosure/2005-February/031831.html'],
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2007-5863'],
|
||||
['OSVDB', '40722'],
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -30,11 +30,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1'],
|
||||
['CVE', '2005-2847'],
|
||||
['OSVDB', '19279'],
|
||||
['BID', '14712'],
|
||||
['NSS', '19556'],
|
||||
['URL', 'http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1'],
|
||||
['MIL', '99'],
|
||||
],
|
||||
'Privileged' => false,
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2005-0491' ],
|
||||
[ 'OSVDB', '14011'],
|
||||
[ 'BID', '12594'],
|
||||
[ 'URL', 'http://lists.netsys.com/pipermail/full-disclosure/2005-February/031831.html'],
|
||||
|
|
|
@ -32,8 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '12238' ],
|
||||
[ 'CVE', '2005-0043' ],
|
||||
[ 'OSVDB', '12833' ],
|
||||
[ 'BID', '12238' ],
|
||||
],
|
||||
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-0015' ],
|
||||
[ 'OSVDB', '31023' ],
|
||||
[ 'BID', '21829' ],
|
||||
[ 'URL', 'http://projects.info-pull.com/moab/MOAB-01-01-2007.html' ],
|
||||
],
|
||||
|
|
|
@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-5107' ],
|
||||
[ 'OSVDB', '37735' ],
|
||||
[ 'URL', 'http://wslabi.com/wabisabilabi/showBidInfo.do?code=ZD-00000148' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-0018' ],
|
||||
[ 'OSVDB', '32032' ],
|
||||
[ 'BID', '23892' ],
|
||||
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/062911.html' ],
|
||||
],
|
||||
|
|
|
@ -29,10 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '9800'],
|
||||
[ 'CVE', '2004-2074'],
|
||||
[ 'URL', 'http://www.milw0rm.com/exploits/823'],
|
||||
[ 'OSVDB', '4986'],
|
||||
[ 'BID', '9800'],
|
||||
[ 'URL', 'http://www.milw0rm.com/exploits/823'],
|
||||
],
|
||||
'Platform' => ['win'],
|
||||
'Privileged' => false,
|
||||
|
|
|
@ -38,9 +38,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '5033' ],
|
||||
[ 'CVE', '2002-0392' ],
|
||||
[ 'OSVDB', '838'],
|
||||
[ 'BID', '5033' ],
|
||||
[ 'URL', 'http://lists.insecure.org/lists/bugtraq/2002/Jun/0184.html'],
|
||||
[ 'MIL', '4'],
|
||||
|
||||
|
|
|
@ -34,9 +34,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '19204' ],
|
||||
[ 'CVE', '2006-3747' ],
|
||||
[ 'OSVDB', '27588' ],
|
||||
[ 'BID', '19204' ],
|
||||
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2006-07/0514.html' ],
|
||||
[ 'URL', 'http://www.milw0rm.com/exploits/3680' ],
|
||||
[ 'URL', 'http://www.milw0rm.com/exploits/3996' ],
|
||||
|
|
|
@ -18,8 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '22791'],
|
||||
[ 'CVE', '2007-0774' ],
|
||||
[ 'OSVDB', '33855' ],
|
||||
[ 'BID', '22791'],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-07-008.html'],
|
||||
|
||||
],
|
||||
|
|
|
@ -29,8 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '7387' ],
|
||||
[ 'CVE', '2005-0595' ],
|
||||
[ 'OSVDB', '14238' ],
|
||||
[ 'BID', '7387' ],
|
||||
[ 'MIL', '11' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -29,8 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['BID', '26803'],
|
||||
['CVE', '2007-6377'],
|
||||
['OSVDB', '42416'],
|
||||
['BID', '26803'],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-5457' ],
|
||||
|
||||
[ 'OSVDB', '51311' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -25,6 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-4008' ],
|
||||
[ 'OSVDB', '49283' ],
|
||||
[ 'URL', 'http://support.bea.com/application_content/product_portlets/securityadvisories/2806.html'],
|
||||
|
||||
],
|
||||
|
|
|
@ -24,6 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '54395' ],
|
||||
[ 'BID', '34033' ],
|
||||
],
|
||||
'Privileged' => true,
|
||||
|
|
|
@ -27,6 +27,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2007-6166' ],
|
||||
[ 'OSVDB', '40876' ],
|
||||
[ 'BID', '26549' ],
|
||||
[ 'URL', 'http://milw0rm.com/exploits/4648' ],
|
||||
],
|
||||
|
|
|
@ -30,8 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-1491' ],
|
||||
[ 'BID', '28394' ],
|
||||
[ 'OSVDB', '43638' ],
|
||||
[ 'BID', '28394' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -30,8 +30,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2005-1009'],
|
||||
['OSVDB', '15234'],
|
||||
['MIL', '12'],
|
||||
['BID', '12967']
|
||||
['BID', '12967'],
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -31,8 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '28795' ],
|
||||
[ 'CVE', '2008-1914' ],
|
||||
[ 'OSVDB', '44454' ],
|
||||
[ 'BID', '28795' ],
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2006-0460'],
|
||||
['OSVDB', '23263'],
|
||||
['BID', '16697'],
|
||||
['URL', 'http://www.frsirt.com/english/advisories/2006/0643' ],
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2005-4085'],
|
||||
['OSVDB', '22238'],
|
||||
['BID', '16147'],
|
||||
['URL', 'http://www.bluecoat.com/support/knowledge/advisory_host_header_stack_overflow.html'],
|
||||
|
||||
|
|
Loading…
Reference in New Issue