Merge branch 'refs_update' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-refs_update

unstable
jvazquez-r7 2012-12-11 12:16:06 +01:00
commit fdb457d82b
22 changed files with 31 additions and 8 deletions

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB', '80980'],
['URL', 'http://seclists.org/fulldisclosure/2012/Apr/78']
],
'Arch' => ARCH_CMD,

View File

@ -29,7 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'OSVDB', '73609' ],
[ 'EDB', '17487' ]
[ 'EDB', '17487' ],
[ 'URL', 'http://www.webidsupport.com/forums/showthread.php?3892' ]
],
'Version' => '$Revision$',
'Privileged' => false,

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB', '86992'],
['EDB', '21665']
],
'Payload' =>

View File

@ -32,7 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '67739']
['OSVDB', '67739'],
['URL', 'http://www.symmetrixtech.com/articles/news-016.html']
],
'Payload' =>
{

View File

@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB', '86672'],
['EDB', '21520'],
['URL', 'http://www.fishnetsecurity.com/6labs/blog/pentesting-qnx-neutrino-rtos'],
['URL', 'http://www.qnx.com/developers/docs/6.3.0SP3/neutrino/utilities/q/qconn.html'],
['URL', 'http://www.qnx.com/developers/docs/6.3.0SP3/neutrino/utilities/q/qconn.html']
],
'Payload' =>
{

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2012-5975'],
['EDB', '23082'],
['OSVDB', '88103'],
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12'],
['URL', 'http://www.ssh.com/index.php/component/content/article/531.html']
],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '83719' ],
[ 'BID', '54234' ]
],
'Platform' => ['linux', 'unix'],

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['OSVDB', '85881'],
['EDB', '21929'],
['URL', 'http://packetstormsecurity.org/files/117070/ProjectPier-0.8.8-Shell-Upload.html']
],
'Platform' => ['linux', 'php'],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'OSVDB', '85117' ],
[ 'BID', '55127' ],
[ 'EDB', '20703' ]
],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2012-4924 ' ],
[ 'OSVDB', '79438' ],
[ 'URL', 'http://dsecrg.com/pages/vul/show.php?id=417' ]
],

View File

@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'OSVDB', '81657'],
[ 'EDB', '18805' ]
[ 'EDB', '18805' ],
[ 'URL', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10028' ]
],
'Payload' =>
{

View File

@ -33,8 +33,10 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2012-4177' ],
[ 'OSVDB', '84402'],
[ 'URL', 'http://seclists.org/fulldisclosure/2012/Jul/375']
[ 'URL', 'http://seclists.org/fulldisclosure/2012/Jul/375'],
[ 'URL', 'http://forums.ubi.com/showthread.php/699940-Uplay-PC-Patch-2-0-4-Security-fix' ]
],
'Platform' => 'win',
'Targets' =>

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2012-4876' ],
[ 'OSVDB', '80661' ],
[ 'EDB', '18675' ]
],

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2011-5164' ],
[ 'OSVDB', '77105' ],
[ 'EDB', '18102' ]
],

View File

@ -32,7 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => "$Revision$",
'References' =>
[
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ],
[ 'OSVDB', '68824' ],
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ]
],
'DefaultOptions' =>
{

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => [ 'win' ],
'References' =>
[
[ 'EDB', '22161' ],
[ 'OSVDB', '85887' ]
],
'Payload' =>

View File

@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '39114' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-078/' ],
[ 'URL', 'http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html' ],
[ 'URL', 'http://www.novell.com/support/kb/doc.php?id=7005573' ]
],
'Privileged' => true,
'Platform' => [ 'java', 'win', 'linux' ],

View File

@ -37,9 +37,10 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2011-5124' ],
[ 'OSVDB', '72095'],
[ 'URL', 'https://kb.bluecoat.com/index?page=content&id=SA55' ],
[ 'URL', 'http://seclists.org/bugtraq/2011/Jul/44' ],
[ 'URL', 'http://seclists.org/bugtraq/2011/Jul/44' ]
],
'Payload' =>
{

View File

@ -33,7 +33,8 @@ class Metasploit3 < Msf::Exploit::Remote
[
['OSVDB', '85060'],
['BID', '55271'],
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171']
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171'],
['URL', 'https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03589863']
],
'Payload' =>
{

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2012-5613'], #DISPUTED
['OSVDB', '88118'],
['EDB', '23083'],
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/13']
],

View File

@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB', '72817'],
['URL', 'http://aluigi.org/adv/genesis_4-adv.txt'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf']
],

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2012-1084' ],
[ 'OSVDB', '75798'],
[ 'BID', '49747' ],
[ 'URL', 'http://aluigi.altervista.org/adv/forcecontrol_1-adv.txt' ],