Land #2020, CVE and OSVDB update
commit
d6374ddfff
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-3502' ],
|
||||
[ 'OSVDB', '91051' ],
|
||||
[ 'US-CERT-VU', '345260' ],
|
||||
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt' ]
|
||||
|
|
|
@ -28,6 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2012-6554'],
|
||||
['OSVDB', '81966'],
|
||||
['URL', 'http://www.activecollab.com/downloads/category/4/package/62/releases'],
|
||||
],
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2011-5130' ],
|
||||
[ 'OSVDB', '77492' ],
|
||||
[ 'URL', 'https://www.familycms.com/blog/2011/11/security-vulnerability-fcms-2-5-2-7-1/' ],
|
||||
[ 'URL', 'http://sourceforge.net/apps/trac/fam-connections/ticket/407' ],
|
||||
|
|
|
@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '91842'],
|
||||
['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'],
|
||||
['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007']
|
||||
],
|
||||
|
|
|
@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '91842'],
|
||||
['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'],
|
||||
['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007']
|
||||
],
|
||||
|
|
|
@ -28,6 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2012-4361'],
|
||||
['OSVDB', '82087'],
|
||||
['EDB', '18893'],
|
||||
['URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?loc=en_US&id=958'],
|
||||
|
|
|
@ -43,6 +43,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
},
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '93537' ],
|
||||
[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ]
|
||||
],
|
||||
'DisclosureDate' => 'Mar 26 2013',
|
||||
|
|
|
@ -37,6 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-2010' ],
|
||||
[ 'OSVDB', '92652' ],
|
||||
[ 'BID', '59316' ],
|
||||
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-5896'],
|
||||
[ 'OSVDB', '80662'],
|
||||
[ 'BID', '52765'],
|
||||
[ 'EDB', '18674']
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-4598' ],
|
||||
[ 'OSVDB', '81657'],
|
||||
[ 'EDB', '18805' ],
|
||||
[ 'URL', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10028' ]
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-4333' ],
|
||||
[ 'OSVDB', '81453'],
|
||||
[ 'BID', '53193'],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/netiware_1-adv.txt' ]
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2012-5002'],
|
||||
['OSVDB', '79691'],
|
||||
['URL', 'http://secunia.com/advisories/47912'],
|
||||
['URL', 'http://www.inshell.net/2012/03/ricoh-dc-software-dl-10-ftp-server-sr10-exe-remote-buffer-overflow-vulnerability/']
|
||||
|
|
|
@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-6530' ],
|
||||
[ 'OSVDB', '82329' ],
|
||||
[ 'EDB', '20676' ],
|
||||
[ 'EDB', '18420' ],
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2012-3274'],
|
||||
['OSVDB', '85060'],
|
||||
['BID', '55271'],
|
||||
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171'],
|
||||
|
|
Loading…
Reference in New Issue