Merge branch 'refs_update' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-refs_update
commit
fdb457d82b
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '80980'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Apr/78']
|
||||
],
|
||||
'Arch' => ARCH_CMD,
|
||||
|
|
|
@ -29,7 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '73609' ],
|
||||
[ 'EDB', '17487' ]
|
||||
[ 'EDB', '17487' ],
|
||||
[ 'URL', 'http://www.webidsupport.com/forums/showthread.php?3892' ]
|
||||
],
|
||||
'Version' => '$Revision$',
|
||||
'Privileged' => false,
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '86992'],
|
||||
['EDB', '21665']
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -32,7 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '67739']
|
||||
['OSVDB', '67739'],
|
||||
['URL', 'http://www.symmetrixtech.com/articles/news-016.html']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '86672'],
|
||||
['EDB', '21520'],
|
||||
['URL', 'http://www.fishnetsecurity.com/6labs/blog/pentesting-qnx-neutrino-rtos'],
|
||||
['URL', 'http://www.qnx.com/developers/docs/6.3.0SP3/neutrino/utilities/q/qconn.html'],
|
||||
['URL', 'http://www.qnx.com/developers/docs/6.3.0SP3/neutrino/utilities/q/qconn.html']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2012-5975'],
|
||||
['EDB', '23082'],
|
||||
['OSVDB', '88103'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12'],
|
||||
['URL', 'http://www.ssh.com/index.php/component/content/article/531.html']
|
||||
],
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '83719' ],
|
||||
[ 'BID', '54234' ]
|
||||
],
|
||||
'Platform' => ['linux', 'unix'],
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['OSVDB', '85881'],
|
||||
['EDB', '21929'],
|
||||
['URL', 'http://packetstormsecurity.org/files/117070/ProjectPier-0.8.8-Shell-Upload.html']
|
||||
],
|
||||
'Platform' => ['linux', 'php'],
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '85117' ],
|
||||
[ 'BID', '55127' ],
|
||||
[ 'EDB', '20703' ]
|
||||
],
|
||||
|
|
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-4924 ' ],
|
||||
[ 'OSVDB', '79438' ],
|
||||
[ 'URL', 'http://dsecrg.com/pages/vul/show.php?id=417' ]
|
||||
],
|
||||
|
|
|
@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '81657'],
|
||||
[ 'EDB', '18805' ]
|
||||
[ 'EDB', '18805' ],
|
||||
[ 'URL', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10028' ]
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -33,8 +33,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-4177' ],
|
||||
[ 'OSVDB', '84402'],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2012/Jul/375']
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2012/Jul/375'],
|
||||
[ 'URL', 'http://forums.ubi.com/showthread.php/699940-Uplay-PC-Patch-2-0-4-Security-fix' ]
|
||||
],
|
||||
'Platform' => 'win',
|
||||
'Targets' =>
|
||||
|
|
|
@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-4876' ],
|
||||
[ 'OSVDB', '80661' ],
|
||||
[ 'EDB', '18675' ]
|
||||
],
|
||||
|
|
|
@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2011-5164' ],
|
||||
[ 'OSVDB', '77105' ],
|
||||
[ 'EDB', '18102' ]
|
||||
],
|
||||
|
|
|
@ -32,7 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => "$Revision$",
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ],
|
||||
[ 'OSVDB', '68824' ],
|
||||
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Platform' => [ 'win' ],
|
||||
'References' =>
|
||||
[
|
||||
[ 'EDB', '22161' ],
|
||||
[ 'OSVDB', '85887' ]
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'BID', '39114' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-078/' ],
|
||||
[ 'URL', 'http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html' ],
|
||||
[ 'URL', 'http://www.novell.com/support/kb/doc.php?id=7005573' ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Platform' => [ 'java', 'win', 'linux' ],
|
||||
|
|
|
@ -37,9 +37,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2011-5124' ],
|
||||
[ 'OSVDB', '72095'],
|
||||
[ 'URL', 'https://kb.bluecoat.com/index?page=content&id=SA55' ],
|
||||
[ 'URL', 'http://seclists.org/bugtraq/2011/Jul/44' ],
|
||||
[ 'URL', 'http://seclists.org/bugtraq/2011/Jul/44' ]
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -33,7 +33,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['OSVDB', '85060'],
|
||||
['BID', '55271'],
|
||||
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171']
|
||||
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171'],
|
||||
['URL', 'https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03589863']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2012-5613'], #DISPUTED
|
||||
['OSVDB', '88118'],
|
||||
['EDB', '23083'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/13']
|
||||
],
|
||||
|
|
|
@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '72817'],
|
||||
['URL', 'http://aluigi.org/adv/genesis_4-adv.txt'],
|
||||
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf']
|
||||
],
|
||||
|
|
|
@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2012-1084' ],
|
||||
[ 'OSVDB', '75798'],
|
||||
[ 'BID', '49747' ],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/forcecontrol_1-adv.txt' ],
|
||||
|
|
Loading…
Reference in New Issue