Merge branch 'refs_update' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-refs_update

unstable
jvazquez-r7 2012-12-11 12:16:06 +01:00
commit fdb457d82b
22 changed files with 31 additions and 8 deletions

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
['OSVDB', '80980'],
['URL', 'http://seclists.org/fulldisclosure/2012/Apr/78'] ['URL', 'http://seclists.org/fulldisclosure/2012/Apr/78']
], ],
'Arch' => ARCH_CMD, 'Arch' => ARCH_CMD,

View File

@ -29,7 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'OSVDB', '73609' ], [ 'OSVDB', '73609' ],
[ 'EDB', '17487' ] [ 'EDB', '17487' ],
[ 'URL', 'http://www.webidsupport.com/forums/showthread.php?3892' ]
], ],
'Version' => '$Revision$', 'Version' => '$Revision$',
'Privileged' => false, 'Privileged' => false,

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
['OSVDB', '86992'],
['EDB', '21665'] ['EDB', '21665']
], ],
'Payload' => 'Payload' =>

View File

@ -32,7 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '67739'] ['OSVDB', '67739'],
['URL', 'http://www.symmetrixtech.com/articles/news-016.html']
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
['OSVDB', '86672'],
['EDB', '21520'], ['EDB', '21520'],
['URL', 'http://www.fishnetsecurity.com/6labs/blog/pentesting-qnx-neutrino-rtos'], ['URL', 'http://www.fishnetsecurity.com/6labs/blog/pentesting-qnx-neutrino-rtos'],
['URL', 'http://www.qnx.com/developers/docs/6.3.0SP3/neutrino/utilities/q/qconn.html'], ['URL', 'http://www.qnx.com/developers/docs/6.3.0SP3/neutrino/utilities/q/qconn.html']
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
['CVE', '2012-5975'], ['CVE', '2012-5975'],
['EDB', '23082'], ['EDB', '23082'],
['OSVDB', '88103'],
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12'], ['URL', 'http://seclists.org/fulldisclosure/2012/Dec/12'],
['URL', 'http://www.ssh.com/index.php/component/content/article/531.html'] ['URL', 'http://www.ssh.com/index.php/component/content/article/531.html']
], ],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'OSVDB', '83719' ],
[ 'BID', '54234' ] [ 'BID', '54234' ]
], ],
'Platform' => ['linux', 'unix'], 'Platform' => ['linux', 'unix'],

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
['OSVDB', '85881'], ['OSVDB', '85881'],
['EDB', '21929'],
['URL', 'http://packetstormsecurity.org/files/117070/ProjectPier-0.8.8-Shell-Upload.html'] ['URL', 'http://packetstormsecurity.org/files/117070/ProjectPier-0.8.8-Shell-Upload.html']
], ],
'Platform' => ['linux', 'php'], 'Platform' => ['linux', 'php'],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'OSVDB', '85117' ],
[ 'BID', '55127' ], [ 'BID', '55127' ],
[ 'EDB', '20703' ] [ 'EDB', '20703' ]
], ],

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2012-4924 ' ],
[ 'OSVDB', '79438' ], [ 'OSVDB', '79438' ],
[ 'URL', 'http://dsecrg.com/pages/vul/show.php?id=417' ] [ 'URL', 'http://dsecrg.com/pages/vul/show.php?id=417' ]
], ],

View File

@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
[ 'OSVDB', '81657'], [ 'OSVDB', '81657'],
[ 'EDB', '18805' ] [ 'EDB', '18805' ],
[ 'URL', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10028' ]
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -33,8 +33,10 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2012-4177' ],
[ 'OSVDB', '84402'], [ 'OSVDB', '84402'],
[ 'URL', 'http://seclists.org/fulldisclosure/2012/Jul/375'] [ 'URL', 'http://seclists.org/fulldisclosure/2012/Jul/375'],
[ 'URL', 'http://forums.ubi.com/showthread.php/699940-Uplay-PC-Patch-2-0-4-Security-fix' ]
], ],
'Platform' => 'win', 'Platform' => 'win',
'Targets' => 'Targets' =>

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2012-4876' ],
[ 'OSVDB', '80661' ], [ 'OSVDB', '80661' ],
[ 'EDB', '18675' ] [ 'EDB', '18675' ]
], ],

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2011-5164' ],
[ 'OSVDB', '77105' ], [ 'OSVDB', '77105' ],
[ 'EDB', '18102' ] [ 'EDB', '18102' ]
], ],

View File

@ -32,7 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => "$Revision$", 'Version' => "$Revision$",
'References' => 'References' =>
[ [
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], [ 'OSVDB', '68824' ],
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ]
], ],
'DefaultOptions' => 'DefaultOptions' =>
{ {

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => [ 'win' ], 'Platform' => [ 'win' ],
'References' => 'References' =>
[ [
[ 'EDB', '22161' ],
[ 'OSVDB', '85887' ] [ 'OSVDB', '85887' ]
], ],
'Payload' => 'Payload' =>

View File

@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '39114' ], [ 'BID', '39114' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-078/' ], [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-078/' ],
[ 'URL', 'http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html' ], [ 'URL', 'http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html' ],
[ 'URL', 'http://www.novell.com/support/kb/doc.php?id=7005573' ]
], ],
'Privileged' => true, 'Privileged' => true,
'Platform' => [ 'java', 'win', 'linux' ], 'Platform' => [ 'java', 'win', 'linux' ],

View File

@ -37,9 +37,10 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2011-5124' ],
[ 'OSVDB', '72095'], [ 'OSVDB', '72095'],
[ 'URL', 'https://kb.bluecoat.com/index?page=content&id=SA55' ], [ 'URL', 'https://kb.bluecoat.com/index?page=content&id=SA55' ],
[ 'URL', 'http://seclists.org/bugtraq/2011/Jul/44' ], [ 'URL', 'http://seclists.org/bugtraq/2011/Jul/44' ]
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -33,7 +33,8 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
['OSVDB', '85060'], ['OSVDB', '85060'],
['BID', '55271'], ['BID', '55271'],
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171'] ['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171'],
['URL', 'https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03589863']
], ],
'Payload' => 'Payload' =>
{ {

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' => 'References' =>
[ [
['CVE', '2012-5613'], #DISPUTED ['CVE', '2012-5613'], #DISPUTED
['OSVDB', '88118'],
['EDB', '23083'], ['EDB', '23083'],
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/13'] ['URL', 'http://seclists.org/fulldisclosure/2012/Dec/13']
], ],

View File

@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
], ],
'References' => 'References' =>
[ [
['OSVDB', '72817'],
['URL', 'http://aluigi.org/adv/genesis_4-adv.txt'], ['URL', 'http://aluigi.org/adv/genesis_4-adv.txt'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf'] ['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf']
], ],

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2012-1084' ],
[ 'OSVDB', '75798'], [ 'OSVDB', '75798'],
[ 'BID', '49747' ], [ 'BID', '49747' ],
[ 'URL', 'http://aluigi.altervista.org/adv/forcecontrol_1-adv.txt' ], [ 'URL', 'http://aluigi.altervista.org/adv/forcecontrol_1-adv.txt' ],