Land #2020, CVE and OSVDB update

unstable
William Vu 2013-06-25 08:17:54 -05:00
commit d6374ddfff
14 changed files with 14 additions and 0 deletions

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2013-3502' ],
[ 'OSVDB', '91051' ],
[ 'US-CERT-VU', '345260' ],
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt' ]

View File

@ -28,6 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2012-6554'],
['OSVDB', '81966'],
['URL', 'http://www.activecollab.com/downloads/category/4/package/62/releases'],
],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2011-5130' ],
[ 'OSVDB', '77492' ],
[ 'URL', 'https://www.familycms.com/blog/2011/11/security-vulnerability-fcms-2-5-2-7-1/' ],
[ 'URL', 'http://sourceforge.net/apps/trac/fam-connections/ticket/407' ],

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB', '91842'],
['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'],
['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007']
],

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB', '91842'],
['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'],
['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007']
],

View File

@ -28,6 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2012-4361'],
['OSVDB', '82087'],
['EDB', '18893'],
['URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?loc=en_US&id=958'],

View File

@ -43,6 +43,7 @@ class Metasploit4 < Msf::Exploit::Remote
},
'References' =>
[
[ 'OSVDB', '93537' ],
[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ]
],
'DisclosureDate' => 'Mar 26 2013',

View File

@ -37,6 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-2010' ],
[ 'OSVDB', '92652' ],
[ 'BID', '59316' ],
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2012-5896'],
[ 'OSVDB', '80662'],
[ 'BID', '52765'],
[ 'EDB', '18674']

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2012-4598' ],
[ 'OSVDB', '81657'],
[ 'EDB', '18805' ],
[ 'URL', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10028' ]

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2012-4333' ],
[ 'OSVDB', '81453'],
[ 'BID', '53193'],
[ 'URL', 'http://aluigi.altervista.org/adv/netiware_1-adv.txt' ]

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2012-5002'],
['OSVDB', '79691'],
['URL', 'http://secunia.com/advisories/47912'],
['URL', 'http://www.inshell.net/2012/03/ricoh-dc-software-dl-10-ftp-server-sr10-exe-remote-buffer-overflow-vulnerability/']

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2012-6530' ],
[ 'OSVDB', '82329' ],
[ 'EDB', '20676' ],
[ 'EDB', '18420' ],

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['CVE', '2012-3274'],
['OSVDB', '85060'],
['BID', '55271'],
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171'],