OSVDB reference update from Steve Tornio

git-svn-id: file:///home/svn/framework3/trunk@7149 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2009-10-12 14:39:51 +00:00
parent a8ccd1fe98
commit 26db223636
32 changed files with 74 additions and 42 deletions

View File

@ -29,6 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2008-7232'],
['OSVDB', '58140'],
['URL', 'http://aluigi.altervista.org/adv/xtacacsdz-adv.txt'],
],
'Payload' =>
@ -86,4 +88,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp
end
end
end

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2009-0695'],
['OSVDB', '55839'],
['US-CERT-VU', '654545'],
['URL', 'http://snosoft.blogspot.com/'],
['URL', 'http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/'],

View File

@ -32,9 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' => [
[ 'CVE', '2005-0511'],
[ 'BID', '12622'],
[ 'OSVDB', '14047'],
[ 'CVE', '2005-0511'],
[ 'MIL', '81'],
],
'Privileged' => false,
@ -113,4 +113,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end
end

View File

@ -32,8 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '18672'],
['CVE', '2005-2612'],
['OSVDB', '18672'],
['BID', '14533'],
['MIL', '86'],
],
@ -84,4 +84,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end
end

View File

@ -30,10 +30,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '11719'],
[ 'OSVDB', '17613'],
[ 'CVE', '2005-2086'],
[ 'CVE', '2004-1315'],
[ 'OSVDB', '11719'],
[ 'OSVDB', '17613'],
[ 'BID', '14086'],
[ 'BID', '10701'],
],

View File

@ -30,9 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-2630'],
['OSVDB', '25846'],
['BID', '18107'],
['CVE', '2006-2630'],
['URL', 'http://research.eeye.com/html/advisories/published/AD20060612.html'],
],
'Privileged' => true,
@ -97,4 +97,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -49,6 +49,7 @@ include Msf::Exploit::Remote::HttpServer::HTML
'References' =>
[
['CVE', '2007-0038'],
['OSVDB', '33629'],
['BID', '23194'],
['URL', 'http://www.microsoft.com/technet/security/advisory/935423.mspx'],
['URL', 'http://www.determina.com/security.research/vulnerabilities/ani-header.html'],
@ -579,4 +580,4 @@ include Msf::Exploit::Remote::HttpServer::HTML
return tag
end
end
end

View File

@ -24,8 +24,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'US-CERT-VU', '848873' ],
[ 'CVE', '2008-4384' ],
[ 'OSVDB', '48946' ],
[ 'US-CERT-VU', '848873' ],
[ 'BID', '31604' ],
],
'DefaultOptions' =>
@ -115,4 +116,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -32,6 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2003-1336'],
[ 'OSVDB', '2665'],
[ 'BID', '8819' ],
],
@ -77,4 +79,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -39,10 +39,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['MSB', 'MS06-001'],
['BID', '16074'],
['CVE', '2005-4560'],
['OSVDB', '21987'],
['MSB', 'MS06-001'],
['BID', '16074'],
['MIL', '111'],
['URL', 'http://www.microsoft.com/technet/security/advisory/912840.mspx'],
['URL', 'http://wvware.sourceforge.net/caolan/ora-wmf.html'],
@ -193,4 +193,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-3008' ],
[ 'OSVDB', '47962' ],
[ 'BID', '31065' ],
[ 'MSB', 'MS08-053' ],
],
@ -112,4 +113,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -39,6 +39,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-0476'],
['OSVDB', '22789'],
['BID', '16410'],
],
'DefaultOptions' =>
@ -146,4 +148,4 @@ class Metasploit3 < Msf::Exploit::Remote
return songs
end
end
end

View File

@ -29,8 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '27344' ],
[ 'CVE', '2008-0065' ],
[ 'OSVDB', '41707' ],
[ 'BID', '27344' ],
],
'DefaultOptions' =>
{
@ -154,4 +155,4 @@ itunes_album_id>
a>.Z.......\./!.
!.UP.......B...&
Z....D)ydB.,.vy/
=end
=end

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-0348' ],
[ 'OSVDB', '34315' ],
[ 'BID', '23071' ],
],
'DefaultOptions' =>
@ -88,4 +89,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -38,6 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE','CVE-2006-5198' ],
[ 'OSVDB', '30433' ],
[ 'BID','21060' ],
],
'DefaultOptions' =>

View File

@ -31,8 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '21206'],
[ 'CVE', '2006-6063'],
[ 'OSVDB', '30537'],
[ 'BID', '21206'],
[ 'URL', 'http://secunia.com/advisories/22999/' ],
],
@ -81,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-4515' ],
[ 'OSVDB', '37739' ],
[ 'BID', '25494' ],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=591' ],
],
@ -93,4 +94,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -32,6 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-3147' ],
[ 'OSVDB', '37082' ],
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063817.html' ],
],
'DefaultOptions' =>
@ -88,4 +90,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '24217' ],
[ 'CVE', '2007-2987' ],
[ 'OSVDB', '36715' ],
[ 'BID', '24217' ],
],
'Payload' =>
{

View File

@ -43,6 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['CVE', '2007-0038'],
['CVE', '2007-1765'],
['OSVDB', '33629'],
['BID', '23194'],
['URL', 'http://www.microsoft.com/technet/security/advisory/935423.mspx'],
['URL', 'http://www.determina.com/security_center/security_advisories/securityadvisory_0day_032907.asp'],
@ -349,4 +350,4 @@ class Metasploit3 < Msf::Exploit::Remote
rand_text_alphanumeric(rand(128)+4)
end
end
end

View File

@ -31,10 +31,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'http://www.milw0rm.com/exploits/7888' ],
[ 'OSVDB', '10416' ],
[ 'BID', '11248' ],
[ 'CVE', '2004-0964' ],
[ 'OSVDB', '10416' ],
[ 'URL', 'http://www.milw0rm.com/exploits/7888' ],
[ 'BID', '11248' ],
],
'Payload' =>
{

View File

@ -32,8 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '15457'],
[ 'CVE', '2005-3683'],
[ 'OSVDB', '20909'],
[ 'BID', '15457'],
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038808.html'],
],

View File

@ -23,6 +23,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-5792' ],
[ 'OSVDB', '33969' ],
[ 'URL', 'http://www.metasploit.com/' ],
[ 'URL', 'http://www.xlink.com' ],
],

View File

@ -25,6 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-5792' ],
[ 'OSVDB', '58646' ],
[ 'URL', 'http://www.metasploit.com/' ],
[ 'URL', 'http://www.xlink.com' ],
],

View File

@ -31,8 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '18703'],
[ 'CVE', '2005-2551'],
[ 'OSVDB', '18703'],
[ 'BID', '14548'],
[ 'MIL', '89'],
@ -78,4 +78,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -19,6 +19,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-1365' ],
[ 'OSVDB', '42499' ],
],
'DefaultOptions' =>
{
@ -95,4 +97,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -32,8 +32,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '25772' ],
[ 'CVE', '2007-5067' ],
[ 'OSVDB', '40594'],
[ 'OSVDB', '40595'],
[ 'BID', '25772' ],
[ 'URL', 'http://www.milw0rm.com/exploits/4450' ],
],
'Privileged' => false,
@ -93,4 +95,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2006-3838'],
['OSVDB', '27526'],
['BID', '19163'],
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-06-024.html'],
],

View File

@ -33,8 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '19164'],
['CVE', '2006-3838'],
['OSVDB', '27528'],
['BID', '19164'],
],
'DefaultOptions' =>
{
@ -82,4 +83,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -31,8 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '25044'],
['CVE', '2007-4006'],
['OSVDB', '38572'],
['BID', '25044'],
],
'DefaultOptions' =>
{
@ -75,4 +76,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -24,6 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', 'CVE-2008-1117' ],
[ 'OSVDB', '43544' ],
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -33,8 +33,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '10367'],
[ 'CVE', '2004-1558'],
[ 'OSVDB', '10367'],
[ 'BID', '11256'],
[ 'URL', 'http://www.securiteam.com/windowsntfocus/5GP0M2KE0S.html'],
@ -98,4 +98,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end