Land #10275, Update missing CVE references for exploit modules
parent
4284ffe8a4
commit
d480ee8e20
|
@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2014-9727' ],
|
||||
[ 'OSVDB', '103289' ],
|
||||
[ 'BID', '65520' ],
|
||||
[ 'URL', 'http://www.kapple.de/?p=75' ], # vulnerability details with PoC
|
||||
|
|
|
@ -111,6 +111,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2013-0156'],
|
||||
['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/']
|
||||
],
|
||||
'DisclosureDate' => 'Apr 11 2013',
|
||||
|
|
|
@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2012-5223'],
|
||||
['OSVDB', '78508'],
|
||||
['BID', '51647'],
|
||||
['EDB', '18424']
|
||||
|
|
|
@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-3399' ],
|
||||
[ 'OSVDB', '83719' ],
|
||||
[ 'BID', '54234' ]
|
||||
],
|
||||
|
|
|
@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-4140' ],
|
||||
[ 'OSVDB', '90222' ],
|
||||
[ 'BID', '37314' ],
|
||||
[ 'EBD', '24492' ],
|
||||
|
|
|
@ -41,6 +41,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2014-9308'],
|
||||
['OSVDB', '116806'],
|
||||
['WPVDB', '7745']
|
||||
],
|
||||
|
|
|
@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2015-4133'],
|
||||
['EDB', '36374'],
|
||||
['OSVDB', '88853'],
|
||||
['WPVDB', '7867']
|
||||
|
|
|
@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Name' => 'ALLPlayer M3U Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack-based buffer overflow vulnerability in
|
||||
ALLPlayer 2.8.1, caused by a long string in a playlist entry.
|
||||
ALLPlayer 5.8.1, caused by a long string in a playlist entry.
|
||||
By persuading the victim to open a specially-crafted .M3U file, a
|
||||
remote attacker could execute arbitrary code on the system or cause
|
||||
the application to crash. This module has been tested successfully on
|
||||
|
@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-7409' ],
|
||||
[ 'BID', '62926' ],
|
||||
[ 'BID', '63896' ],
|
||||
[ 'EDB', '28855' ],
|
||||
|
|
|
@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Author' => [ 'Jeremy Brown', 'MC' ],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2010-4740' ],
|
||||
[ 'OSVDB', '68096'],
|
||||
[ 'BID', '43289' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf' ],
|
||||
|
|
|
@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Author' => ['Rh0'], # discovery and metasploit module
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2011-5170'],
|
||||
['OSVDB', '77453'],
|
||||
['EDB', '18178']
|
||||
],
|
||||
|
|
|
@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2011-5171'],
|
||||
['BID', '50997'],
|
||||
['OSVDB', '77600'],
|
||||
['EDB', '18220'],
|
||||
|
|
|
@ -20,6 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Author' => [ 'MC' ],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-2515' ],
|
||||
[ 'OSVDB', '58423'],
|
||||
[ 'BID', '36546' ],
|
||||
],
|
||||
|
|
|
@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2011-5165' ],
|
||||
[ 'OSVDB', '63349' ],
|
||||
[ 'EDB', '11975' ], #Initial disclosure
|
||||
[ 'EDB', '17727' ] #This exploit is based on this poc
|
||||
|
|
|
@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Author' => [ 'James Fitts <fitts.james[at]gmail.com>' ],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2010-5299' ],
|
||||
[ 'OSVDB', '73627'],
|
||||
[ 'EDB', '14720' ],
|
||||
],
|
||||
|
|
|
@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2010-5081' ],
|
||||
[ 'OSVDB', '78078' ],
|
||||
[ 'EDB', '14373' ],
|
||||
[ 'BID', '34514' ]
|
||||
|
|
|
@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-1641' ],
|
||||
[ 'OSVDB', '81487' ],
|
||||
[ 'EDB', '11957' ],
|
||||
[ 'BID', '34864' ]
|
||||
|
|
|
@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-4730' ],
|
||||
[ 'EDB', '37731'],
|
||||
[ 'OSVDB', '94624']
|
||||
],
|
||||
|
|
|
@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-4730' ],
|
||||
[ 'OSVDB', '94624'],
|
||||
[ 'EDB', '27703']
|
||||
],
|
||||
|
|
|
@ -26,6 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-0680' ],
|
||||
[ 'OSVDB', '95819'],
|
||||
[ 'BID', '53455'],
|
||||
[ 'ZDI', '13-178' ],
|
||||
|
|
|
@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2010-5324' ],
|
||||
[ 'OSVDB', '63412' ],
|
||||
[ 'BID', '39114' ],
|
||||
[ 'ZDI', '10-078' ],
|
||||
|
|
|
@ -49,6 +49,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-3158' ],
|
||||
[ 'OSVDB', '46578' ],
|
||||
[ 'BID', '30001' ]
|
||||
],
|
||||
|
|
Loading…
Reference in New Issue