Massive OSVDB reference update from Steve Tornio.

git-svn-id: file:///home/svn/framework3/trunk@6629 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2009-06-07 20:20:42 +00:00
parent 0bbaeeb2c9
commit a5f567e76e
117 changed files with 287 additions and 193 deletions

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-2221'],
[ 'OSVDB', '9011'],
[ 'BID', '10926'],
[ 'MIL', '38'],
@ -89,4 +90,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -35,6 +35,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2002-1473'],
[ 'OSVDB', '9638'],
[ 'URL', 'http://archives.neohapsis.com/archives/hp/2002-q3/0064.html'],
],
@ -101,4 +103,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -29,8 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '8573'],
['CVE', '2001-0800'],
['OSVDB', '8573'],
['URL', 'http://www.lsd-pl.net/code/IRIX/irx_lpsched.c'],
['MIL', '35'],
],
@ -79,4 +79,4 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("Payload: #{payload.encoded}")
end
end
end

View File

@ -19,6 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', 'CVE-2005-2799'],
[ 'OSVDB', '19389' ],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=305'],
],
'Payload' =>
@ -94,4 +95,4 @@ DataSegSize=0x4000
disconnect
end
end
end

View File

@ -66,6 +66,7 @@ documentation (external/ruby-lorcon/README) for more information.
'References' =>
[
['CVE', '2006-6332'],
['OSVDB', '31267'],
['URL', 'http://www.madwifi.org'],
]
))

View File

@ -31,8 +31,8 @@ require 'msf/core'
'Platform' => 'linux',
'References' =>
[
[ 'OSVDB', '15492' ],
[ 'CVE', '2005-1099' ],
[ 'OSVDB', '15492' ],
[ 'BID', '13129' ],
[ 'URL', 'http://www.milw0rm.com/exploits/934' ],
],
@ -71,4 +71,4 @@ require 'msf/core'
end
end
end

View File

@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2006-0295'],
['OSVDB', '22893'],
['BID', '16476'],
['URL', 'http://www.mozilla.org/security/announce/mfsa2006-04.html'],
],
@ -118,4 +119,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
end
end
end

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', 'CVE-2009-0950'],
['OSVDB', '54833'],
['URL', 'http://support.apple.com/kb/HT3592'],
['URL', 'http://redpig.dataspill.org/2009/05/drive-by-attack-for-itunes-811.html'],
],

View File

@ -35,8 +35,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '6018'],
['CVE', '2001-0311'],
['OSVDB', '6018'],
['BID', '11032'],
['URL', 'http://www.securiteam.com/exploits/6M00O150KG.html'],
],
@ -234,4 +234,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
end

View File

@ -34,7 +34,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2007-0395'],
['CVE', '2006-0395'],
['CVE', '2007-6165'],
['OSVDB', '40875'],
['BID', '26510'],
['BID', '16907']
],
@ -166,4 +168,4 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("Waiting for a payload session (backgrounding)...")
end
end
end

View File

@ -30,7 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'MIL', '19'],
[ 'CVE', '2004-2687'],
[ 'OSVDB', '13378' ],
[ 'URL', 'http://distcc.samba.org/security.html'],
],
@ -117,4 +118,4 @@ class Metasploit3 < Msf::Exploit::Remote
return res
end
end
end

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Dogfood CRM spell.php Remote Command Execution',
'Description' => %q{
This module exploits a previously unpublished vulnerability in the
Dogfood CRM mail fuction which is vulnerable to command injection
Dogfood CRM mail function which is vulnerable to command injection
in the spell check feature. Because of character restrictions, this
exploit works best with the double-reverse telnet payload. This
vulnerability was discovered by LSO and affects v2.0.10.
@ -35,6 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '54707' ],
[ "URL", "http://downloads.sourceforge.net/dogfood/" ],
],
'Privileged' => false,

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2005-3757'],
['OSVDB', '20981'],
['BID', '15509'],
],
@ -141,4 +142,4 @@ class Metasploit3 < Msf::Exploit::Remote
stop_service
end
end
end

View File

@ -34,9 +34,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '1999-1053' ],
[ 'OSVDB', '84' ],
[ 'BID', '776' ],
[ 'CVE', '1999-1053' ],
],
'Privileged' => false,
'Payload' =>
@ -77,4 +77,4 @@ class Metasploit3 < Msf::Exploit::Remote
}, 25)
end
end
end

View File

@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2005-2773'],
['OSVDB', '19057'],
['BID', '14662'],
['CVE', '2005-2773'],
],
'Privileged' => false,
'Payload' =>
@ -82,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end
end

View File

@ -21,6 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '54706' ],
[ 'BID', '35028' ],
[ 'URL', 'http://www.milw0rm.com/exploits/8733' ],
],
@ -116,4 +117,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-0955' ],
[ 'OSVDB', '45655' ],
],
'DefaultOptions' =>
{
@ -110,4 +111,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -30,8 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-2919' ],
[ 'OSVDB', '37042' ],
[ 'BID', '24328' ],
[ 'OSVDB', '37042' ],
],
'DefaultOptions' =>
{

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-3605' ],
[ 'OSVDB', '37690' ],
[ 'BID', '24772' ],
],
'DefaultOptions' =>
@ -94,4 +95,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-5711' ],
[ 'OSVDB', '41073' ],
[ 'BID', '27534' ],
[ 'URL', 'http://milw0rm.com/exploits/5049' ],
],
@ -103,4 +105,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-5779'],
[ 'OSVDB', '38282'],
[ 'URL', 'http://secunia.com/advisories/27418/' ],
],
'DefaultOptions' =>
@ -92,4 +94,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-6530'],
[ 'OSVDB', '39901'],
[ 'BID', '27025' ],
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/059296.html' ],
],
@ -92,4 +94,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', 'CVE-2007-1819' ],
[ 'OSVDB', '34317'],
[ 'BID', '23239' ],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=497' ],
],
@ -118,4 +119,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -25,8 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-0215' ],
[ 'OSVDB', '52958' ],
[ 'BID', '34228' ],
[ 'OSVDB', '5958' ],
],
'DefaultOptions' =>
{

View File

@ -28,6 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', 'CVE-2007-4474' ],
[ 'OSVDB', '40954' ],
[ 'BID', '26972' ],
[ 'URL', 'http://milw0rm.com/exploits/4820' ],
],
@ -130,4 +131,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -33,6 +33,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-1016' ],
[ 'OSVDB', '31647' ],
[ 'BID', '16870' ],
],
'Payload' =>
@ -99,4 +101,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -40,8 +40,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '32721'],
['CVE', '2008-4844'],
['OSVDB', '50622'],
['BID', '32721'],
['URL', 'http://www.microsoft.com/technet/security/advisory/961051.mspx'],
['URL', 'http://taossa.com/archive/bh08sotirovdowd.pdf'],
],

View File

@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-5217' ],
[ 'OSVDB', '37785' ],
[ 'URL', 'http://secunia.com/advisories/26970/' ],
],
'DefaultOptions' =>
@ -112,4 +114,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-2918' ],
[ 'OSVDB', '36820'],
[ 'BID', '24254' ],
],
'DefaultOptions' =>
@ -91,4 +92,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-5660' ],
[ 'OSVDB', '38347' ],
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/059288.html' ],
],
'DefaultOptions' =>
@ -101,4 +102,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -25,6 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-5660' ],
[ 'OSVDB', '38347' ],
[ 'BID', '26280' ],
],
'Payload' =>
@ -87,4 +88,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -35,6 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-3961'],
[ 'OSVDB', '27698'],
[ 'BID', '19265'],
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048565.html'],
],
@ -117,4 +118,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -29,6 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-6707'],
[ 'OSVDB', '32399'],
[ 'URL', 'http://secunia.com/advisories/23463' ],
],
'DefaultOptions' =>
@ -90,4 +92,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -30,10 +30,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2003-0344' ],
[ 'OSVDB', '2967' ],
[ 'BID', '7806' ],
[ 'MSB', 'MS03-020' ],
[ 'CVE', '2003-0344' ],
[ 'MIL', '84' ],
],
'Payload' =>
@ -107,4 +107,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -41,10 +41,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['MSB', 'MS06-013'],
['OSVDB', '24050'],
['BID', '17196'],
['CVE', '2006-1359'],
['OSVDB', '24050'],
['MSB', 'MS06-013'],
['BID', '17196'],
['URL', 'http://secunia.com/secunia_research/2006-7/advisory/'],
['URL', 'http://seclists.org/lists/bugtraq/2006/Mar/0410.html'],
['URL', 'http://www.kb.cert.org/vuls/id/876678'],
@ -164,4 +164,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -37,10 +37,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['MSB', 'MS06-055' ],
['CVE', '2006-4868' ],
['BID', '20096' ],
['OSVDB', '28946' ],
['MSB', 'MS06-055' ],
['BID', '20096' ],
],
'Payload' =>
{
@ -132,4 +132,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -34,8 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-3730'],
[ 'MSB', 'MS06-057'],
[ 'OSVDB', '27110' ],
[ 'MSB', 'MS06-057'],
[ 'BID', '19030' ],
[ 'URL', 'http://browserfun.blogspot.com/2006/07/mobb-18-webviewfoldericon-setslice.html' ]
],
@ -123,4 +123,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-4777' ],
[ 'OSVDB', '28842' ],
[ 'BID', '20047' ],
[ 'URL', 'https://www.blackhat.com/presentations/bh-eu-07/Sotirov/Sotirov-Source-Code.zip' ],
[ 'URL', 'http://www.microsoft.com/technet/security/Bulletin/MS06-067.mspx' ]
@ -107,4 +108,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -31,10 +31,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['MSB', 'MS06-071' ],
['CVE', '2006-5745' ],
['BID', '20915' ],
['OSVDB', '29425' ],
['MSB', 'MS06-071' ],
['BID', '20915' ],
],
'Payload' =>
{
@ -137,4 +137,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end

View File

@ -25,6 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', 'CVE-2009-0075' ],
[ 'OSVDB', '51839'],
],
'DefaultOptions' =>
{

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'US-CERT-VU', '166651' ],
[ 'CVE', '2008-4385' ],
[ 'OSVDB', '50122' ],
[ 'US-CERT-VU', '166651' ],
],
'Payload' =>
{
@ -86,4 +87,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -31,10 +31,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2003-0352' ],
[ 'OSVDB', '2100' ],
[ 'MSB', 'MS03-026' ],
[ 'BID', '8205' ],
[ 'CVE', '2003-0352' ],
],
'Privileged' => true,
'DefaultOptions' =>
@ -222,4 +222,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-3039'],
[ 'OSVDB', '39123'],
[ 'MSB', 'MS07-065'],
],
'Privileged' => true,
@ -151,4 +152,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -38,6 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2007-1748'],
['OSVDB', '34100'],
['MSB', 'MS07-029'],
['URL', 'http://www.microsoft.com/technet/security/advisory/935964.mspx']
],
@ -290,4 +291,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -62,6 +62,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-6055'],
['OSVDB', '30296'],
['URL', 'http://projects.info-pull.com/mokb/MOKB-13-11-2006.html'],
['URL', 'ftp://ftp.dlink.com/Wireless/dwlg132/Driver/DWLG132_driver_102.zip'],
],
@ -201,4 +203,4 @@ class Metasploit3 < Msf::Exploit::Remote
return frame
end
end
end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=702' ],
[ 'CVE', '2008-2158' ],
[ 'OSVDB', '45714' ],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=702' ],
],
'DefaultOptions' =>
{
@ -81,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -27,8 +27,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'http://www.milw0rm.com/exploits/7651' ],
[ 'OSVDB', '53249' ],
[ 'URL', 'http://www.milw0rm.com/exploits/7651' ],
[ 'BID', '33091' ],
],
'Payload' =>

View File

@ -25,6 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-4922' ],
[ 'OSVDB', '49592' ],
[ 'BID', '31987' ],
],
'DefaultOptions' =>

View File

@ -35,6 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2004-0362'],
['OSVDB', '4355'],
['URL', 'http://www.eeye.com/html/Research/Advisories/AD20040318.html'],
['URL', 'http://xforce.iss.net/xforce/alerts/id/166'],
@ -140,4 +141,4 @@ class Metasploit3 < Msf::Exploit::Remote
}
end
end
end

View File

@ -30,8 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '19243' ],
[ 'CVE', '2006-3952' ],
[ 'OSVDB', '27646' ],
[ 'BID', '19243' ],
],
'Privileged' => true,
'DefaultOptions' =>
@ -82,4 +83,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -17,8 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '19065' ],
[ 'CVE', '2006-3726' ],
[ 'OSVDB', '27389' ],
[ 'BID', '19065' ],
],
'Privileged' => true,
'Payload' =>
@ -54,4 +55,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -31,6 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-2407'],
['OSVDB', '25569'],
['BID', '17958'],
],
'DefaultOptions' =>
@ -84,4 +86,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -30,9 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '13454'],
[ 'OSVDB', '16049'],
[ 'CVE', '2005-1415'],
[ 'OSVDB', '16049'],
[ 'BID', '13454'],
[ 'URL', 'http://archives.neohapsis.com/archives/fulldisclosure/2005-04/0674.html'],
[ 'MIL', '22'],
],
@ -73,4 +73,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -29,10 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'http://www.milw0rm.com/exploits/54' ],
[ 'CVE', '2003-0558' ],
[ 'BID', '7860' ],
[ 'OSVDB', '4587' ],
[ 'BID', '7860' ],
[ 'URL', 'http://www.milw0rm.com/exploits/54' ],
],
'DefaultOptions' =>
{
@ -122,4 +122,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(client)
service.close_client(client)
end
end
end

View File

@ -36,12 +36,12 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
# This exploit appears to have been reported multiple times.
[ 'BID', '16370'],
[ 'BID', '22045'],
[ 'BID', '17835'],
[ 'CVE', '2006-0441'],
[ 'CVE', '2006-2212'],
[ 'OSVDB', '25670'],
[ 'BID', '16370'],
[ 'BID', '22045'],
[ 'BID', '17835'],
[ 'URL', 'http://www.milw0rm.com/exploits/1448'],
[ 'URL', 'http://www.milw0rm.com/exploits/1452'],
[ 'URL', 'http://www.milw0rm.com/exploits/1462'],
@ -100,4 +100,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -29,8 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '20076' ],
[ 'CVE', '2006-4847' ],
[ 'OSVDB', '28939' ],
[ 'BID', '20076' ],
],
'Privileged' => false,
'Payload' =>
@ -75,4 +76,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -30,9 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2004-0735'],
[ 'OSVDB', '8061' ],
[ 'URL', 'http://www.milw0rm.com/exploits/357'],
[ 'BID', '10743'],
[ 'OSVDB', '8061' ],
],
'Privileged' => false,
'Payload' =>
@ -93,4 +93,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp
end
end
end

View File

@ -29,9 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '25328' ],
[ 'OSVDB', '7416' ],
[ 'CVE', '2004-2466' ],
[ 'OSVDB', '7416' ],
[ 'BID', '25328' ],
],
'DefaultOptions' =>
{

View File

@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-0183' ],
[ 'OSVDB', '51745' ],
],
'DefaultOptions' =>
{

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-6204' ],
[ 'OSVDB', '39530' ],
[ 'BID', '26741' ],
],
'DefaultOptions' =>
@ -69,4 +70,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -25,6 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-0067' ],
[ 'OSVDB', '53222' ],
[ 'BID', '33147' ],
],
'DefaultOptions' =>

View File

@ -30,9 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '8965'],
[ 'CVE', '2003-1192'],
[ 'OSVDB', '2757'],
[ 'BID', '8965'],
[ 'URL', 'http://www.k-otik.net/exploits/11.19.iawebmail.pl.php'],
[ 'MIL', '24'],
@ -74,4 +74,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -24,7 +24,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'URI', 'http://dvlabs.tippingpoint.com/advisory/TPTI-07-05' ],
[ 'CVE', '2007-1868'],
[ 'OSVDB', '34678'],
[ 'BID', '23264'],
[ 'URL', 'http://dvlabs.tippingpoint.com/advisory/TPTI-07-05' ],
],
'DefaultOptions' =>
{
@ -222,4 +225,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-4880' ],
[ 'OSVDB', '38161' ],
[ 'BID', '25743' ],
],
'DefaultOptions' =>
@ -71,4 +72,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -42,6 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-1561'],
[ 'OSVDB', '10406'],
[ 'BID', '11271'],
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-09/0366.html'],
@ -100,4 +101,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -30,8 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '11043'],
['CVE', '2004-0798'],
['OSVDB', '9177'],
['BID', '11043'],
],
'DefaultOptions' =>
{
@ -86,4 +87,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -31,10 +31,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2005-1348'],
['OSVDB', '15913'],
['OSVDB', '15737'],
['BID', '13350'],
['CVE', '2005-1348'],
['NSS', '18123'],
['MIL', '97'],
],
@ -75,4 +75,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-4305'],
['OSVDB', '28300'],
['BID', '19660'],
['CVE', '2006-4305'],
],
'DefaultOptions' =>
{
@ -90,4 +90,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -37,11 +37,11 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2005-0684'],
[ 'OSVDB', '15816'],
[ 'URL', 'http://www.idefense.com/application/poi/display?id=234&type=vulnerabilities'],
[ 'MIL', '37'],
[ 'BID', '13368'],
[ 'CVE', '2005-0684'],
],
'Privileged' => true,
'Payload' =>
@ -88,4 +88,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -39,11 +39,11 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-5156' ],
[ 'OSVDB', '29421 ' ],
[ 'URL', 'http://www.milw0rm.com/exploits/2467' ],
[ 'URL', 'http://www.remote-exploit.org/advisories/mcafee-epo.pdf' ],
[ 'CVE', '2006-5156' ],
[ 'BID', '20288' ],
[ 'OSVDB', '29421 ' ],
],
'DefaultOptions' =>
{
@ -119,4 +119,4 @@ class Metasploit3 < Msf::Exploit::Remote
def wfs_delay
25
end
end
end

View File

@ -34,9 +34,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '2674'],
[ 'OSVDB', '3323'],
[ 'CVE', '2001-0241'],
[ 'BID', '2674'],
[ 'MSB', 'MS01-023'],
[ 'URL', 'http://seclists.org/lists/bugtraq/2001/May/0005.html'],
[ 'MIL', '27'],
@ -116,4 +116,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2001-0500'],
[ 'OSVDB', '568'],
[ 'MSB', 'MS01-033'],
[ 'BID', '2880'],
],
@ -79,4 +80,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -38,9 +38,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '1999-0874'],
[ 'OSVDB', '3325'],
[ 'BID', '307'],
[ 'CVE', '1999-0874'],
[ 'URL', 'http://www.eeye.com/html/research/advisories/AD19990608.html'],
[ 'MIL', '26'],
[ 'MSB', 'MS02-018'],
@ -83,4 +83,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -31,10 +31,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '7116'],
[ 'OSVDB', '4467'],
[ 'MSB', 'MS03-007'],
[ 'CVE', '2003-0109'],
[ 'OSVDB', '4467'],
[ 'BID', '7116'],
[ 'MSB', 'MS03-007'],
[ 'MIL', '28'],
],
@ -187,4 +187,4 @@ class Metasploit3 < Msf::Exploit::Remote
return false
end
end
end

View File

@ -32,9 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-1520'],
[ 'OSVDB', '11838'],
[ 'BID', '11675'],
[ 'CVE', '2004-1520'],
[ 'MIL', '33'],
],
@ -97,4 +97,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -32,7 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-3926' ],
[ 'CVE', '2007-3925' ],
[ 'OSVDB', '36219' ],
[ 'BID', '24962' ],
],
'Privileged' => true,
@ -77,4 +78,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051229.html'],
[ 'CVE', '2006-6423'],
[ 'OSVDB', '32125'],
[ 'BID', '21492'],
[ 'URL', 'http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051229.html'],
],
'Privileged' => true,
'DefaultOptions' =>
@ -76,4 +77,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2005-2278'],
[ 'OSVDB', '17844'],
[ 'BID', '14243'],
[ 'NSS', '19193'],
@ -74,4 +75,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -35,6 +35,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2005-3155'],
[ 'OSVDB', '19842'],
[ 'BID', '15006'],
],
'Privileged' => true,
@ -80,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -31,8 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '11838'],
[ 'CVE', '2004-1520'],
[ 'OSVDB', '11838'],
[ 'BID', '11675'],
[ 'MIL', '90'],
@ -85,4 +85,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '28245' ],
[ 'OSVDB', '43111' ],
[ 'CVE', '2008-1358' ],
[ 'BID', '28245' ],
[ 'URL', 'http://www.milw0rm.com/exploits/5248' ],
],
'Privileged' => false,
@ -100,4 +100,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -32,6 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-1255' ],
[ 'OSVDB', '23950' ],
[ 'BID', '17138' ],
],
'Privileged' => true,
@ -75,4 +77,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
disconnect
end
end
end

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-1255' ],
[ 'OSVDB', '23950' ],
[ 'BID', '17138' ],
[ 'URL', 'http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1104.html' ],
],
@ -75,4 +76,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -32,6 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-1373' ],
[ 'OSVDB', '33883' ],
],
'Privileged' => true,
'DefaultOptions' =>
@ -95,4 +96,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '9007'],
[ 'OSVDB', '2952'],
[ 'CVE', ' 2003-0822'],
[ 'OSVDB', '2952'],
[ 'BID', '9007'],
[ 'MSB', 'MS03-051'],
[ 'MIL', '29'],
],
@ -127,4 +127,4 @@ class Metasploit3 < Msf::Exploit::Remote
return Exploit::CheckCode::Safe
end
end
end

View File

@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '2048' ],
[ 'OSVDB', '463' ],
[ 'CVE', '2000-1089' ],
[ 'OSVDB', '463' ],
[ 'BID', '2048' ],
[ 'MSB', 'MS00-094' ],
],
'Privileged' => false,
@ -87,4 +87,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -35,9 +35,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '8035'],
[ 'OSVDB', '4535'],
[ 'CVE', '2003-0349'],
[ 'OSVDB', '4535'],
[ 'BID', '8035'],
[ 'MSB', 'MS03-022'],
[ 'URL', 'http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0120.html'],
[ 'MIL', '30'],
@ -110,4 +110,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -34,8 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '12258'],
[ 'CVE', '2004-1134'],
[ 'OSVDB', '12258'],
[ 'URL', 'http://www.exaprobe.com/labs/advisories/esa-2004-1206.html'],
[ 'MIL', '32'],
[ 'BID', '11820'],
@ -119,4 +119,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
end
end
end

View File

@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '9682'],
[ 'CVE', '2004-0297'],
[ 'OSVDB', '3984'],
[ 'BID', '9682'],
[ 'URL', 'http://secunia.com/advisories/10880/'],
[ 'MIL', '34'],
@ -82,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -29,9 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '29310'],
['CVE', '2008-2240'],
['OSVDB', '45415'],
['BID', '29310'],
['URL', 'http://www-01.ibm.com/support/docview.wss?uid=swg21303057'],
],
'DefaultOptions' =>

View File

@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '29328' ],
[ 'CVE', '2008-2499' ],
[ 'OSVDB', '45610' ],
[ 'BID', '29328' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-08-028/' ],
],
'Privileged' => true,

View File

@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2005-1815'],
['OSVDB', '16957'],
['BID', '13788'],
['CVE', '2005-1815'],
],
'Privileged' => true,
@ -74,4 +74,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2008-1661'],
['OSVDB', '45924'],
],
'DefaultOptions' =>
{
@ -81,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -35,8 +35,11 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => 'win',
'References' =>
[
[ 'URL', 'http://risesecurity.org/advisory/RISE-2007003/' ],
],
[ 'CVE', '2007-5243' ],
[ 'OSVDB', '38607' ],
[ 'BID', '25917' ],
[ 'URL', 'http://www.risesecurity.org/advisories/RISE-2007002.txt' ],
],
'Privileged' => true,
'License' => MSF_LICENSE,
'Payload' =>
@ -181,4 +184,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -35,8 +35,11 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => 'win',
'References' =>
[
[ 'URL', 'http://risesecurity.org/advisory/RISE-2007003/' ],
],
[ 'CVE', '2007-5243' ],
[ 'OSVDB', '38606' ],
[ 'BID', '25917' ],
[ 'URL', 'http://www.risesecurity.org/advisories/RISE-2007002.txt' ],
],
'Privileged' => true,
'License' => MSF_LICENSE,
'Payload' =>
@ -181,4 +184,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -35,8 +35,11 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => 'win',
'References' =>
[
[ 'URL', 'http://risesecurity.org/advisory/RISE-2007003/' ],
],
[ 'CVE', '2007-5243' ],
[ 'OSVDB', '38605' ],
[ 'BID', '25917' ],
[ 'URL', 'http://www.risesecurity.org/advisories/RISE-2007002.txt' ],
],
'Privileged' => true,
'License' => MSF_LICENSE,
'Payload' =>
@ -143,4 +146,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -28,7 +28,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-1676' ],
[ 'CVE', '2007-3872' ],
[ 'OSVDB', '39527' ],
[ 'BID', '25255' ],
],
'DefaultOptions' =>
@ -71,4 +72,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2007-1674'],
['OSVDB', '34964'],
['URL', 'http://www.tippingpoint.com/security/advisories/TSRT-07-04.html'],
],
'DefaultOptions' =>
@ -137,4 +138,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp
end
end
end

View File

@ -31,8 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '16396' ],
[ 'CVE', '2005-4411' ],
[ 'OSVDB', '22103'],
[ 'BID', '16396' ],
],
'DefaultOptions' =>
{
@ -77,4 +78,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end

View File

@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-3901' ],
[ 'OSVDB', '39126' ],
[ 'MSB', 'MS07-064' ],
[ 'BID', '26787' ],
[ 'CVE', '2007-3901' ],
],
'DefaultOptions' =>
{
@ -90,4 +91,4 @@ class Metasploit3 < Msf::Exploit::Remote
service.close_client(client)
end
end
end

Some files were not shown because too many files have changed in this diff Show More