Skip to content

Commit 9d97dc8

Browse files
committed
Add Metasploit blogs as references, because they're useful.
1 parent 9ab62de commit 9d97dc8

13 files changed

+25
-12
lines changed

modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@ def initialize(info = {})
3030
[ 'URL', 'http://pastie.org/private/4egcqt9nucxnsiksudy5dw' ],
3131
[ 'URL', 'http://pastie.org/private/feg8du0e9kfagng4rrg' ],
3232
[ 'URL', 'http://stratsec.blogspot.com.au/2012/03/ms12-020-vulnerability-for-breakfast.html' ],
33-
[ 'EDB', 18606 ]
33+
[ 'EDB', 18606 ],
34+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/03/21/metasploit-update' ]
3435
],
3536
'Author' =>
3637
[

modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,8 @@ def initialize
3333
],
3434
'References' => [
3535
['CVE', '2012-2122'],
36-
['OSVDB', '82804']
36+
['OSVDB', '82804'],
37+
['URL', 'https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql']
3738
],
3839
'DisclosureDate' => 'Jun 09 2012',
3940
'License' => MSF_LICENSE

modules/auxiliary/scanner/telnet/telnet_encrypt_overflow.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,8 @@ def initialize
2828
[
2929
['BID', '51182'],
3030
['CVE', '2011-4862'],
31-
['EDB', 18280]
31+
['EDB', 18280],
32+
['URL', 'https://community.rapid7.com/community/metasploit/blog/2011/12/28/more-fun-with-bsd-derived-telnet-daemons']
3233
]
3334
)
3435
register_options(

modules/exploits/linux/ssh/f5_bigip_known_privkey.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,8 @@ def initialize(info = {})
4040
[
4141
[ 'URL', 'https://www.trustmatta.com/advisories/MATTA-2012-002.txt' ],
4242
[ 'CVE', '2012-1493' ],
43-
[ 'OSVDB', '82780' ]
43+
[ 'OSVDB', '82780' ],
44+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/06/25/press-f5-for-root-shell' ]
4445
],
4546
'DisclosureDate' => "Jun 11 2012",
4647
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },

modules/exploits/multi/browser/java_atomicreferencearray.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,8 @@ def initialize( info = {} )
4343
['URL', 'http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3'],
4444
['URL', 'http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx'],
4545
['URL', 'http://schierlm.users.sourceforge.net/TypeConfusion.html'],
46-
['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0507']
46+
['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0507'],
47+
['URL', 'https://community.rapid7.com/community/metasploit/blog/2012/03/29/cve-2012-0507--java-strikes-again']
4748
],
4849
'Platform' => [ 'java', 'win', 'osx', 'linux', 'solaris' ],
4950
'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },

modules/exploits/multi/browser/java_jre17_exec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,8 @@ def initialize( info = {} )
5050
[ 'URL', 'http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html' ],
5151
[ 'URL', 'http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/' ],
5252
[ 'URL', 'http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html' ],
53-
[ 'URL', 'http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html' ]
53+
[ 'URL', 'http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html' ],
54+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day' ]
5455
],
5556
'Platform' => [ 'java', 'win', 'linux' ],
5657
'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },

modules/exploits/windows/browser/adobe_flash_otf_font.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,8 @@ def initialize(info={})
3838
[ 'URL', 'http://labs.alienvault.com/labs/index.php/2012/cve-2012-1535-adobe-flash-being-exploited-in-the-wild/' ],
3939
[ 'URL', 'http://vrt-blog.snort.org/2012/08/cve-2012-1535-flash-0-day-in-wild.html' ],
4040
[ 'URL', 'https://developer.apple.com/fonts/TTRefMan/RM06/Chap6.html' ],
41-
[ 'URL', 'http://contagiodump.blogspot.com.es/2012/08/cve-2012-1535-samples-and-info.html' ]
41+
[ 'URL', 'http://contagiodump.blogspot.com.es/2012/08/cve-2012-1535-samples-and-info.html' ],
42+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/08/17/adobe-flash-player-exploit-cve-2012-1535-now-available-for-metasploit' ]
4243
],
4344
'Payload' =>
4445
{

modules/exploits/windows/browser/adobe_flash_rtmp.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,8 @@ def initialize(info={})
5050
[ 'OSVDB', '81656'],
5151
[ 'BID', '53395' ],
5252
[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb12-09.html'], # Patch info
53-
[ 'URL', 'http://contagiodump.blogspot.com.es/2012/05/may-3-cve-2012-0779-world-uyghur.html' ]
53+
[ 'URL', 'http://contagiodump.blogspot.com.es/2012/05/may-3-cve-2012-0779-world-uyghur.html' ],
54+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/06/22/the-secret-sauce-to-cve-2012-0779-adobe-flash-object-confusion-vulnerability' ]
5455
],
5556
'Payload' =>
5657
{

modules/exploits/windows/browser/clear_quest_cqole.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ def initialize(info={})
4444
[ 'OSVDB', '81443'],
4545
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-113/' ],
4646
[ 'URL', 'http://www-304.ibm.com/support/docview.wss?uid=swg21591705' ],
47+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/07/11/it-isnt-always-about-buffer-overflow' ]
4748
],
4849
'Payload' =>
4950
{

modules/exploits/windows/browser/ms12_037_same_id.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ def initialize(info={})
3636
[ 'CVE', '2012-1875' ],
3737
[ 'OSVDB', '82865'],
3838
[ 'URL', 'http://labs.alienvault.com/labs/index.php/2012/ongoing-attacks-exploiting-cve-2012-1875/'],
39-
[ 'URL', 'https://twitter.com/binjo/status/212795802974830592' ] # Exploit found in the wild
39+
[ 'URL', 'https://twitter.com/binjo/status/212795802974830592' ], # Exploit found in the wild
40+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/06/18/metasploit-exploits-critical-microsoft-vulnerabilities']
4041
],
4142
'Payload' =>
4243
{

0 commit comments

Comments
 (0)