From eb963ae52af82681207629d3ae2a13618c76104d Mon Sep 17 00:00:00 2001 From: Steve Tornio Date: Sun, 5 Aug 2012 09:01:46 -0500 Subject: [PATCH 1/4] add osvdb ref --- modules/exploits/windows/http/sws_connection_bof.rb | 1 + 1 file changed, 1 insertion(+) diff --git a/modules/exploits/windows/http/sws_connection_bof.rb b/modules/exploits/windows/http/sws_connection_bof.rb index 3096b9faf9..7bdddc3998 100644 --- a/modules/exploits/windows/http/sws_connection_bof.rb +++ b/modules/exploits/windows/http/sws_connection_bof.rb @@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote ], 'References' => [ + ['OSVDB', '84310'], ['EDB', '19937'], ['URL', 'http://ghostinthelab.wordpress.com/2012/07/19/simplewebserver-2-2-rc2-remote-buffer-overflow-exploit/'] ], From 79e04bb793c08d3b048f162c4d6c6abf872e835b Mon Sep 17 00:00:00 2001 From: Steve Tornio Date: Sun, 5 Aug 2012 09:02:11 -0500 Subject: [PATCH 2/4] add osvdb ref --- .../exploits/windows/browser/cisco_playerpt_setsource_surl.rb | 1 + 1 file changed, 1 insertion(+) diff --git a/modules/exploits/windows/browser/cisco_playerpt_setsource_surl.rb b/modules/exploits/windows/browser/cisco_playerpt_setsource_surl.rb index 5554e29d39..be4cb48cad 100644 --- a/modules/exploits/windows/browser/cisco_playerpt_setsource_surl.rb +++ b/modules/exploits/windows/browser/cisco_playerpt_setsource_surl.rb @@ -46,6 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'CVE', '2012-0284' ], + [ 'OSVDB', '84309'], [ 'BID', '54588' ], [ 'URL', 'http://secunia.com/secunia_research/2012-25/' ], From b646dcc87f763851aee1e98ae6742d52b42a3b79 Mon Sep 17 00:00:00 2001 From: Steve Tornio Date: Sun, 5 Aug 2012 09:02:32 -0500 Subject: [PATCH 3/4] add osvdb ref --- modules/exploits/multi/http/cuteflow_upload_exec.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/multi/http/cuteflow_upload_exec.rb b/modules/exploits/multi/http/cuteflow_upload_exec.rb index c8ccf2b8e8..f6a98f929f 100644 --- a/modules/exploits/multi/http/cuteflow_upload_exec.rb +++ b/modules/exploits/multi/http/cuteflow_upload_exec.rb @@ -28,8 +28,8 @@ class Metasploit3 < Msf::Exploit::Remote ], 'References' => [ - ['URL', 'http://itsecuritysolutions.org/2012-07-01-CuteFlow-2.11.2-multiple-security-vulnerabilities/'] - #['OSVDB', ''], + ['URL', 'http://itsecuritysolutions.org/2012-07-01-CuteFlow-2.11.2-multiple-security-vulnerabilities/'], + ['OSVDB', '84829'], #['EDB', ''], ], 'Payload' => From 54ed27c1b320b161e6b301b980b0b2c34ab5b8e0 Mon Sep 17 00:00:00 2001 From: Steve Tornio Date: Sun, 5 Aug 2012 09:02:54 -0500 Subject: [PATCH 4/4] add osvdb ref --- modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb | 1 + 1 file changed, 1 insertion(+) diff --git a/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb b/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb index 80386a3db8..0aac9c665b 100644 --- a/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb +++ b/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb @@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'CVE', '2012-2953' ], + [ 'OSVDB', '84120' ], [ 'BID', '54426' ], [ 'EDB', '20088' ], [ 'URL', 'http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00']