Skip to content

Commit 11fd032

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 0ff7e4c commit 11fd032

File tree

1 file changed

+39
-9
lines changed

1 file changed

+39
-9
lines changed

db/modules_metadata_base.json

Lines changed: 39 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -58717,7 +58717,7 @@
5871758717
"Cliff Stoll",
5871858718
5871958719
],
58720-
"description": "This module exploits a stack buffer overflow in fingerd on 4.3BSD.\n\n This vulnerability was exploited by the Morris worm in 1988-11-02.\n Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg.\n\n Currently, only bsd/vax/shell_reverse_tcp is supported.",
58720+
"description": "This module exploits a stack buffer overflow in fingerd on 4.3BSD.\n\n This vulnerability was exploited by the Morris worm in 1988-11-02.\n Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg.\n\n Currently, only bsd/vax/shell_reverse_tcp is supported.",
5872158721
"references": [
5872258722
"URL-https://en.wikipedia.org/wiki/Morris_worm",
5872358723
"URL-https://spaf.cerias.purdue.edu/tech-reps/823.pdf",
@@ -58733,14 +58733,24 @@
5873358733
"targets": [
5873458734
"@(#)fingerd.c 5.1 (Berkeley) 6/6/85"
5873558735
],
58736-
"mod_time": "2020-09-18 11:38:43 +0000",
58736+
"mod_time": "2025-04-18 12:44:40 +0000",
5873758737
"path": "/modules/exploits/bsd/finger/morris_fingerd_bof.rb",
5873858738
"is_install_path": true,
5873958739
"ref_name": "bsd/finger/morris_fingerd_bof",
5874058740
"check": true,
5874158741
"post_auth": false,
5874258742
"default_credential": false,
58743-
"notes": {},
58743+
"notes": {
58744+
"Reliability": [
58745+
"repeatable-session"
58746+
],
58747+
"Stability": [
58748+
"crash-service-restarts"
58749+
],
58750+
"SideEffects": [
58751+
"ioc-in-logs"
58752+
]
58753+
},
5874458754
"session_types": false,
5874558755
"needs_cleanup": null
5874658756
},
@@ -58813,7 +58823,7 @@
5881358823
"author": [
5881458824
5881558825
],
58816-
"description": "This module allows execution of native payloads from a privileged Firefox Javascript shell.\n It places the specified payload into memory, adds the necessary protection flags,\n and calls it, which can be useful for upgrading a Firefox javascript shell to a Meterpreter\n session without touching the disk.",
58826+
"description": "This module allows execution of native payloads from a privileged Firefox Javascript shell.\n It places the specified payload into memory, adds the necessary protection flags,\n and calls it, which can be useful for upgrading a Firefox javascript shell to a Meterpreter\n session without touching the disk.",
5881758827
"references": [],
5881858828
"platform": "Firefox",
5881958829
"arch": "",
@@ -58823,14 +58833,24 @@
5882358833
"targets": [
5882458834
"Native Payload"
5882558835
],
58826-
"mod_time": "2020-09-22 02:56:51 +0000",
58836+
"mod_time": "2025-04-18 13:01:04 +0000",
5882758837
"path": "/modules/exploits/firefox/local/exec_shellcode.rb",
5882858838
"is_install_path": true,
5882958839
"ref_name": "firefox/local/exec_shellcode",
5883058840
"check": false,
5883158841
"post_auth": false,
5883258842
"default_credential": false,
58833-
"notes": {},
58843+
"notes": {
58844+
"Reliability": [
58845+
"repeatable-session"
58846+
],
58847+
"Stability": [
58848+
"crash-safe"
58849+
],
58850+
"SideEffects": [
58851+
"ioc-in-logs"
58852+
]
58853+
},
5883458854
"session_types": [],
5883558855
"needs_cleanup": null,
5883658856
"actions": []
@@ -59752,7 +59772,7 @@
5975259772
"optyx <optyx@no$email.com>",
5975359773
5975459774
],
59755-
"description": "This module exploits an arbitrary command execution flaw in\n the in.lpd service shipped with all versions of Irix.",
59775+
"description": "This module exploits an arbitrary command execution flaw in\n the in.lpd service shipped with all versions of Irix.",
5975659776
"references": [
5975759777
"CVE-2001-0800",
5975859778
"OSVDB-8573"
@@ -59765,14 +59785,24 @@
5976559785
"targets": [
5976659786
"Automatic Target"
5976759787
],
59768-
"mod_time": "2020-10-02 17:38:06 +0000",
59788+
"mod_time": "2025-04-18 13:36:02 +0000",
5976959789
"path": "/modules/exploits/irix/lpd/tagprinter_exec.rb",
5977059790
"is_install_path": true,
5977159791
"ref_name": "irix/lpd/tagprinter_exec",
5977259792
"check": true,
5977359793
"post_auth": false,
5977459794
"default_credential": false,
59775-
"notes": {},
59795+
"notes": {
59796+
"Reliability": [
59797+
"repeatable-session"
59798+
],
59799+
"Stability": [
59800+
"crash-safe"
59801+
],
59802+
"SideEffects": [
59803+
"ioc-in-logs"
59804+
]
59805+
},
5977659806
"session_types": false,
5977759807
"needs_cleanup": null
5977859808
},

0 commit comments

Comments
 (0)