Skip to content

Commit 783ffb1

Browse files
committed
Add Adobe security bulletin references
1 parent b3bfaec commit 783ffb1

File tree

7 files changed

+11
-4
lines changed

7 files changed

+11
-4
lines changed

modules/exploits/windows/browser/adobe_flash_otf_font.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,8 @@ def initialize(info={})
3939
[ 'URL', 'http://vrt-blog.snort.org/2012/08/cve-2012-1535-flash-0-day-in-wild.html' ],
4040
[ 'URL', 'https://developer.apple.com/fonts/TTRefMan/RM06/Chap6.html' ],
4141
[ 'URL', 'http://contagiodump.blogspot.com.es/2012/08/cve-2012-1535-samples-and-info.html' ],
42-
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/08/17/adobe-flash-player-exploit-cve-2012-1535-now-available-for-metasploit' ]
42+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/08/17/adobe-flash-player-exploit-cve-2012-1535-now-available-for-metasploit' ],
43+
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb12-18.html']
4344
],
4445
'Payload' =>
4546
{

modules/exploits/windows/browser/adobe_geticon.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ def initialize(info = {})
3939
[ 'CVE', '2009-0927' ],
4040
[ 'OSVDB', '53647' ],
4141
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-014/' ],
42+
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb09-04.html']
4243
],
4344
'DefaultOptions' =>
4445
{

modules/exploits/windows/browser/adobe_jbig2decode.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ def initialize(info = {})
4040
[ 'CVE' , '2009-0658' ],
4141
[ 'OSVDB', '52073' ],
4242
[ 'URL', 'http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html'],
43+
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb09-04.html']
4344
],
4445
'DefaultOptions' =>
4546
{

modules/exploits/windows/browser/adobe_media_newplayer.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,8 @@ def initialize(info = {})
3939
[
4040
[ 'CVE', '2009-4324' ],
4141
[ 'BID', '37331' ],
42-
[ 'OSVDB', '60980' ]
42+
[ 'OSVDB', '60980' ],
43+
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb10-02.html' ]
4344
],
4445
'DefaultOptions' =>
4546
{

modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ def initialize(info = {})
3232
[ 'CVE', '2010-3653'],
3333
[ 'OSVDB', '68803'],
3434
[ 'URL', 'http://www.exploit-db.com/sploits/Adobe_Shockwave_Director_rcsL_Chunk_Memory_Corruption.zip' ],
35+
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb10-25.html' ]
3536
],
3637
'DefaultOptions' =>
3738
{

modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,8 @@ def initialize(info = {})
3838
[ 'OSVDB', '63667' ],
3939
[ 'URL', 'http://blog.didierstevens.com/2010/04/06/update-escape-from-pdf/' ],
4040
[ 'URL', 'http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/' ],
41-
[ 'URL', 'http://blog.didierstevens.com/2010/03/29/escape-from-pdf/' ]
41+
[ 'URL', 'http://blog.didierstevens.com/2010/03/29/escape-from-pdf/' ],
42+
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb10-15.html' ]
4243
],
4344
'DisclosureDate' => 'Mar 29 2010',
4445
'Payload' =>

modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,8 @@ def initialize(info = {})
4949
[ 'OSVDB', '63667' ],
5050
[ 'URL', 'http://blog.didierstevens.com/2010/04/06/update-escape-from-pdf/' ],
5151
[ 'URL', 'http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/' ],
52-
[ 'URL', 'http://blog.didierstevens.com/2010/03/29/escape-from-pdf/' ]
52+
[ 'URL', 'http://blog.didierstevens.com/2010/03/29/escape-from-pdf/' ],
53+
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb10-15.html' ]
5354
],
5455
'Payload' =>
5556
{

0 commit comments

Comments
 (0)