Land #10275, Update missing CVE references for exploit modules

4.x
Jacob Robles 2018-07-09 13:26:18 -05:00 committed by Jeffrey Martin
parent 4284ffe8a4
commit d480ee8e20
No known key found for this signature in database
GPG Key ID: 0CD9BBC2AF15F171
21 changed files with 22 additions and 1 deletions

View File

@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2014-9727' ],
[ 'OSVDB', '103289' ], [ 'OSVDB', '103289' ],
[ 'BID', '65520' ], [ 'BID', '65520' ],
[ 'URL', 'http://www.kapple.de/?p=75' ], # vulnerability details with PoC [ 'URL', 'http://www.kapple.de/?p=75' ], # vulnerability details with PoC

View File

@ -111,6 +111,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
['CVE', '2013-0156'],
['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/'] ['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/']
], ],
'DisclosureDate' => 'Apr 11 2013', 'DisclosureDate' => 'Apr 11 2013',

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
['CVE', '2012-5223'],
['OSVDB', '78508'], ['OSVDB', '78508'],
['BID', '51647'], ['BID', '51647'],
['EDB', '18424'] ['EDB', '18424']

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2012-3399' ],
[ 'OSVDB', '83719' ], [ 'OSVDB', '83719' ],
[ 'BID', '54234' ] [ 'BID', '54234' ]
], ],

View File

@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2009-4140' ],
[ 'OSVDB', '90222' ], [ 'OSVDB', '90222' ],
[ 'BID', '37314' ], [ 'BID', '37314' ],
[ 'EBD', '24492' ], [ 'EBD', '24492' ],

View File

@ -41,6 +41,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
['CVE', '2014-9308'],
['OSVDB', '116806'], ['OSVDB', '116806'],
['WPVDB', '7745'] ['WPVDB', '7745']
], ],

View File

@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
['CVE', '2015-4133'],
['EDB', '36374'], ['EDB', '36374'],
['OSVDB', '88853'], ['OSVDB', '88853'],
['WPVDB', '7867'] ['WPVDB', '7867']

View File

@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Name' => 'ALLPlayer M3U Buffer Overflow', 'Name' => 'ALLPlayer M3U Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability in This module exploits a stack-based buffer overflow vulnerability in
ALLPlayer 2.8.1, caused by a long string in a playlist entry. ALLPlayer 5.8.1, caused by a long string in a playlist entry.
By persuading the victim to open a specially-crafted .M3U file, a By persuading the victim to open a specially-crafted .M3U file, a
remote attacker could execute arbitrary code on the system or cause remote attacker could execute arbitrary code on the system or cause
the application to crash. This module has been tested successfully on the application to crash. This module has been tested successfully on
@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2013-7409' ],
[ 'BID', '62926' ], [ 'BID', '62926' ],
[ 'BID', '63896' ], [ 'BID', '63896' ],
[ 'EDB', '28855' ], [ 'EDB', '28855' ],

View File

@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'Jeremy Brown', 'MC' ], 'Author' => [ 'Jeremy Brown', 'MC' ],
'References' => 'References' =>
[ [
[ 'CVE', '2010-4740' ],
[ 'OSVDB', '68096'], [ 'OSVDB', '68096'],
[ 'BID', '43289' ], [ 'BID', '43289' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf' ], [ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf' ],

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => ['Rh0'], # discovery and metasploit module 'Author' => ['Rh0'], # discovery and metasploit module
'References' => 'References' =>
[ [
['CVE', '2011-5170'],
['OSVDB', '77453'], ['OSVDB', '77453'],
['EDB', '18178'] ['EDB', '18178']
], ],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
['CVE', '2011-5171'],
['BID', '50997'], ['BID', '50997'],
['OSVDB', '77600'], ['OSVDB', '77600'],
['EDB', '18220'], ['EDB', '18220'],

View File

@ -20,6 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'References' => 'References' =>
[ [
[ 'CVE', '2012-2515' ],
[ 'OSVDB', '58423'], [ 'OSVDB', '58423'],
[ 'BID', '36546' ], [ 'BID', '36546' ],
], ],

View File

@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2011-5165' ],
[ 'OSVDB', '63349' ], [ 'OSVDB', '63349' ],
[ 'EDB', '11975' ], #Initial disclosure [ 'EDB', '11975' ], #Initial disclosure
[ 'EDB', '17727' ] #This exploit is based on this poc [ 'EDB', '17727' ] #This exploit is based on this poc

View File

@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'James Fitts <fitts.james[at]gmail.com>' ], 'Author' => [ 'James Fitts <fitts.james[at]gmail.com>' ],
'References' => 'References' =>
[ [
[ 'CVE', '2010-5299' ],
[ 'OSVDB', '73627'], [ 'OSVDB', '73627'],
[ 'EDB', '14720' ], [ 'EDB', '14720' ],
], ],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2010-5081' ],
[ 'OSVDB', '78078' ], [ 'OSVDB', '78078' ],
[ 'EDB', '14373' ], [ 'EDB', '14373' ],
[ 'BID', '34514' ] [ 'BID', '34514' ]

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2009-1641' ],
[ 'OSVDB', '81487' ], [ 'OSVDB', '81487' ],
[ 'EDB', '11957' ], [ 'EDB', '11957' ],
[ 'BID', '34864' ] [ 'BID', '34864' ]

View File

@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2013-4730' ],
[ 'EDB', '37731'], [ 'EDB', '37731'],
[ 'OSVDB', '94624'] [ 'OSVDB', '94624']
], ],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2013-4730' ],
[ 'OSVDB', '94624'], [ 'OSVDB', '94624'],
[ 'EDB', '27703'] [ 'EDB', '27703']
], ],

View File

@ -26,6 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2013-0680' ],
[ 'OSVDB', '95819'], [ 'OSVDB', '95819'],
[ 'BID', '53455'], [ 'BID', '53455'],
[ 'ZDI', '13-178' ], [ 'ZDI', '13-178' ],

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2010-5324' ],
[ 'OSVDB', '63412' ], [ 'OSVDB', '63412' ],
[ 'BID', '39114' ], [ 'BID', '39114' ],
[ 'ZDI', '10-078' ], [ 'ZDI', '10-078' ],

View File

@ -49,6 +49,7 @@ class MetasploitModule < Msf::Exploit::Local
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2008-3158' ],
[ 'OSVDB', '46578' ], [ 'OSVDB', '46578' ],
[ 'BID', '30001' ] [ 'BID', '30001' ]
], ],