Land #10275, Update missing CVE references for exploit modules

4.x
Jacob Robles 2018-07-09 13:26:18 -05:00 committed by Jeffrey Martin
parent 4284ffe8a4
commit d480ee8e20
No known key found for this signature in database
GPG Key ID: 0CD9BBC2AF15F171
21 changed files with 22 additions and 1 deletions

View File

@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2014-9727' ],
[ 'OSVDB', '103289' ],
[ 'BID', '65520' ],
[ 'URL', 'http://www.kapple.de/?p=75' ], # vulnerability details with PoC

View File

@ -111,6 +111,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2013-0156'],
['URL', 'http://robertheaton.com/2013/07/22/how-to-hack-a-rails-app-using-its-secret-token/']
],
'DisclosureDate' => 'Apr 11 2013',

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2012-5223'],
['OSVDB', '78508'],
['BID', '51647'],
['EDB', '18424']

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2012-3399' ],
[ 'OSVDB', '83719' ],
[ 'BID', '54234' ]
],

View File

@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2009-4140' ],
[ 'OSVDB', '90222' ],
[ 'BID', '37314' ],
[ 'EBD', '24492' ],

View File

@ -41,6 +41,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2014-9308'],
['OSVDB', '116806'],
['WPVDB', '7745']
],

View File

@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2015-4133'],
['EDB', '36374'],
['OSVDB', '88853'],
['WPVDB', '7867']

View File

@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Name' => 'ALLPlayer M3U Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability in
ALLPlayer 2.8.1, caused by a long string in a playlist entry.
ALLPlayer 5.8.1, caused by a long string in a playlist entry.
By persuading the victim to open a specially-crafted .M3U file, a
remote attacker could execute arbitrary code on the system or cause
the application to crash. This module has been tested successfully on
@ -28,6 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2013-7409' ],
[ 'BID', '62926' ],
[ 'BID', '63896' ],
[ 'EDB', '28855' ],

View File

@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'Jeremy Brown', 'MC' ],
'References' =>
[
[ 'CVE', '2010-4740' ],
[ 'OSVDB', '68096'],
[ 'BID', '43289' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf' ],

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => ['Rh0'], # discovery and metasploit module
'References' =>
[
['CVE', '2011-5170'],
['OSVDB', '77453'],
['EDB', '18178']
],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2011-5171'],
['BID', '50997'],
['OSVDB', '77600'],
['EDB', '18220'],

View File

@ -20,6 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'MC' ],
'References' =>
[
[ 'CVE', '2012-2515' ],
[ 'OSVDB', '58423'],
[ 'BID', '36546' ],
],

View File

@ -27,6 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2011-5165' ],
[ 'OSVDB', '63349' ],
[ 'EDB', '11975' ], #Initial disclosure
[ 'EDB', '17727' ] #This exploit is based on this poc

View File

@ -21,6 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [ 'James Fitts <fitts.james[at]gmail.com>' ],
'References' =>
[
[ 'CVE', '2010-5299' ],
[ 'OSVDB', '73627'],
[ 'EDB', '14720' ],
],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2010-5081' ],
[ 'OSVDB', '78078' ],
[ 'EDB', '14373' ],
[ 'BID', '34514' ]

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2009-1641' ],
[ 'OSVDB', '81487' ],
[ 'EDB', '11957' ],
[ 'BID', '34864' ]

View File

@ -24,6 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-4730' ],
[ 'EDB', '37731'],
[ 'OSVDB', '94624']
],

View File

@ -25,6 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-4730' ],
[ 'OSVDB', '94624'],
[ 'EDB', '27703']
],

View File

@ -26,6 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-0680' ],
[ 'OSVDB', '95819'],
[ 'BID', '53455'],
[ 'ZDI', '13-178' ],

View File

@ -23,6 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2010-5324' ],
[ 'OSVDB', '63412' ],
[ 'BID', '39114' ],
[ 'ZDI', '10-078' ],

View File

@ -49,6 +49,7 @@ class MetasploitModule < Msf::Exploit::Local
],
'References' =>
[
[ 'CVE', '2008-3158' ],
[ 'OSVDB', '46578' ],
[ 'BID', '30001' ]
],