Skip to content

Commit

Permalink
Land rapid7#2020, CVE and OSVDB update
Browse files Browse the repository at this point in the history
  • Loading branch information
wvu committed Jun 25, 2013
2 parents 55ea0cb + 4df943d commit d6374dd
Show file tree
Hide file tree
Showing 14 changed files with 14 additions and 0 deletions.
1 change: 1 addition & 0 deletions modules/exploits/linux/http/groundwork_monarch_cmd_exec.rb
Expand Up @@ -34,6 +34,7 @@ def initialize(info={})
],
'References' =>
[
[ 'CVE', '2013-3502' ],
[ 'OSVDB', '91051' ],
[ 'US-CERT-VU', '345260' ],
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt' ]
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/multi/http/activecollab_chat.rb
Expand Up @@ -28,6 +28,7 @@ def initialize(info={})
],
'References' =>
[
['CVE', '2012-6554'],
['OSVDB', '81966'],
['URL', 'http://www.activecollab.com/downloads/category/4/package/62/releases'],
],
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/multi/http/familycms_less_exec.rb
Expand Up @@ -29,6 +29,7 @@ def initialize(info={})
],
'References' =>
[
[ 'CVE', '2011-5130' ],
[ 'OSVDB', '77492' ],
[ 'URL', 'https://www.familycms.com/blog/2011/11/security-vulnerability-fcms-2-5-2-7-1/' ],
[ 'URL', 'http://sourceforge.net/apps/trac/fam-connections/ticket/407' ],
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/multi/http/stunshell_eval.rb
Expand Up @@ -27,6 +27,7 @@ def initialize(info={})
],
'References' =>
[
['OSVDB', '91842'],
['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'],
['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007']
],
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/multi/http/stunshell_exec.rb
Expand Up @@ -27,6 +27,7 @@ def initialize(info={})
],
'References' =>
[
['OSVDB', '91842'],
['URL', 'https://defense.ballastsecurity.net/wiki/index.php/STUNSHELL'],
['URL', 'https://defense.ballastsecurity.net/decoding/index.php?hash=a4cd8ba05eb6ba7fb86dd66bed968007']
],
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/multi/misc/hp_vsa_exec.rb
Expand Up @@ -28,6 +28,7 @@ def initialize(info={})
],
'References' =>
[
['CVE', '2012-4361'],
['OSVDB', '82087'],
['EDB', '18893'],
['URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?loc=en_US&id=958'],
Expand Down
Expand Up @@ -43,6 +43,7 @@ def initialize
},
'References' =>
[
[ 'OSVDB', '93537' ],
[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ]
],
'DisclosureDate' => 'Mar 26 2013',
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/unix/webapp/php_wordpress_total_cache.rb
Expand Up @@ -37,6 +37,7 @@ def initialize(info = {})
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-2010' ],
[ 'OSVDB', '92652' ],
[ 'BID', '59316' ],
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/windows/browser/intrust_annotatex_add.rb
Expand Up @@ -31,6 +31,7 @@ def initialize(info = {})
],
'References' =>
[
[ 'CVE', '2012-5896'],
[ 'OSVDB', '80662'],
[ 'BID', '52765'],
[ 'EDB', '18674']
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/windows/browser/mcafee_mvt_exec.rb
Expand Up @@ -30,6 +30,7 @@ def initialize(info={})
],
'References' =>
[
[ 'CVE', '2012-4598' ],
[ 'OSVDB', '81657'],
[ 'EDB', '18805' ],
[ 'URL', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10028' ]
Expand Down
Expand Up @@ -32,6 +32,7 @@ def initialize(info={})
],
'References' =>
[
[ 'CVE', '2012-4333' ],
[ 'OSVDB', '81453'],
[ 'BID', '53193'],
[ 'URL', 'http://aluigi.altervista.org/adv/netiware_1-adv.txt' ]
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/windows/ftp/ricoh_dl_bof.rb
Expand Up @@ -32,6 +32,7 @@ def initialize(info={})
],
'References' =>
[
['CVE', '2012-5002'],
['OSVDB', '79691'],
['URL', 'http://secunia.com/advisories/47912'],
['URL', 'http://www.inshell.net/2012/03/ricoh-dc-software-dl-10-ftp-server-sr10-exe-remote-buffer-overflow-vulnerability/']
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/windows/http/sysax_create_folder.rb
Expand Up @@ -33,6 +33,7 @@ def initialize(info = {})
],
'References' =>
[
[ 'CVE', '2012-6530' ],
[ 'OSVDB', '82329' ],
[ 'EDB', '20676' ],
[ 'EDB', '18420' ],
Expand Down
1 change: 1 addition & 0 deletions modules/exploits/windows/misc/hp_imc_uam.rb
Expand Up @@ -31,6 +31,7 @@ def initialize(info = {})
],
'References' =>
[
['CVE', '2012-3274'],
['OSVDB', '85060'],
['BID', '55271'],
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-171'],
Expand Down

0 comments on commit d6374dd

Please sign in to comment.