|
58803 | 58803 | "session_types": false, |
58804 | 58804 | "needs_cleanup": null |
58805 | 58805 | }, |
58806 | | - "exploit_dialup/multi/login/manyargs": { |
58807 | | - "name": "System V Derived /bin/login Extraneous Arguments Buffer Overflow", |
58808 | | - "fullname": "exploit/dialup/multi/login/manyargs", |
58809 | | - "aliases": [], |
58810 | | - "rank": 400, |
58811 | | - "disclosure_date": "2001-12-12", |
58812 | | - "type": "exploit", |
58813 | | - "author": [ |
58814 | | - |
58815 | | - ], |
58816 | | - "description": "This exploit connects to a system's modem over dialup and exploits\n a buffer overflow vulnerability in it's System V derived /bin/login.\n The vulnerability is triggered by providing a large number of arguments.", |
58817 | | - "references": [ |
58818 | | - "CVE-2001-0797", |
58819 | | - "OSVDB-690", |
58820 | | - "OSVDB-691", |
58821 | | - "BID-3681", |
58822 | | - "URL-https://web.archive.org/web/20120114122443/http://archives.neohapsis.com/archives/bugtraq/2002-10/0014.html", |
58823 | | - "URL-https://web.archive.org/web/20120114113100/http://archives.neohapsis.com/archives/bugtraq/2004-12/0404.html", |
58824 | | - "URL-https://github.com/0xdea/exploits/blob/master/solaris/raptor_rlogin.c" |
58825 | | - ], |
58826 | | - "platform": "Unix", |
58827 | | - "arch": "tty", |
58828 | | - "rport": null, |
58829 | | - "autofilter_ports": [], |
58830 | | - "autofilter_services": [], |
58831 | | - "targets": [ |
58832 | | - "Solaris 2.6 - 8 (SPARC)" |
58833 | | - ], |
58834 | | - "mod_time": "2025-04-18 10:49:46 +0000", |
58835 | | - "path": "/modules/exploits/dialup/multi/login/manyargs.rb", |
58836 | | - "is_install_path": true, |
58837 | | - "ref_name": "dialup/multi/login/manyargs", |
58838 | | - "check": false, |
58839 | | - "post_auth": false, |
58840 | | - "default_credential": false, |
58841 | | - "notes": { |
58842 | | - "Stability": [ |
58843 | | - "crash-service-restarts" |
58844 | | - ], |
58845 | | - "SideEffects": [ |
58846 | | - "ioc-in-logs" |
58847 | | - ], |
58848 | | - "Reliability": [ |
58849 | | - "repeatable-session" |
58850 | | - ] |
58851 | | - }, |
58852 | | - "session_types": false, |
58853 | | - "needs_cleanup": null |
58854 | | - }, |
58855 | 58806 | "exploit_firefox/local/exec_shellcode": { |
58856 | 58807 | "name": "Firefox Exec Shellcode from Privileged Javascript Shell", |
58857 | 58808 | "fullname": "exploit/firefox/local/exec_shellcode", |
@@ -113566,6 +113517,57 @@ |
113566 | 113517 | "session_types": false, |
113567 | 113518 | "needs_cleanup": null |
113568 | 113519 | }, |
| 113520 | + "exploit_solaris/dialup/manyargs": { |
| 113521 | + "name": "System V Derived /bin/login Extraneous Arguments Buffer Overflow", |
| 113522 | + "fullname": "exploit/solaris/dialup/manyargs", |
| 113523 | + "aliases": [ |
| 113524 | + "exploit/dialup/multi/login/manyargs" |
| 113525 | + ], |
| 113526 | + "rank": 400, |
| 113527 | + "disclosure_date": "2001-12-12", |
| 113528 | + "type": "exploit", |
| 113529 | + "author": [ |
| 113530 | + |
| 113531 | + ], |
| 113532 | + "description": "This exploit connects to a system's modem over dialup and exploits\n a buffer overflow vulnerability in it's System V derived /bin/login.\n The vulnerability is triggered by providing a large number of arguments.", |
| 113533 | + "references": [ |
| 113534 | + "CVE-2001-0797", |
| 113535 | + "OSVDB-690", |
| 113536 | + "OSVDB-691", |
| 113537 | + "BID-3681", |
| 113538 | + "URL-https://web.archive.org/web/20120114122443/http://archives.neohapsis.com/archives/bugtraq/2002-10/0014.html", |
| 113539 | + "URL-https://web.archive.org/web/20120114113100/http://archives.neohapsis.com/archives/bugtraq/2004-12/0404.html", |
| 113540 | + "URL-https://github.com/0xdea/exploits/blob/master/solaris/raptor_rlogin.c" |
| 113541 | + ], |
| 113542 | + "platform": "Unix", |
| 113543 | + "arch": "tty", |
| 113544 | + "rport": null, |
| 113545 | + "autofilter_ports": [], |
| 113546 | + "autofilter_services": [], |
| 113547 | + "targets": [ |
| 113548 | + "Solaris 2.6 - 8 (SPARC)" |
| 113549 | + ], |
| 113550 | + "mod_time": "2025-04-18 11:36:34 +0000", |
| 113551 | + "path": "/modules/exploits/solaris/dialup/manyargs.rb", |
| 113552 | + "is_install_path": true, |
| 113553 | + "ref_name": "solaris/dialup/manyargs", |
| 113554 | + "check": false, |
| 113555 | + "post_auth": false, |
| 113556 | + "default_credential": false, |
| 113557 | + "notes": { |
| 113558 | + "Stability": [ |
| 113559 | + "crash-service-restarts" |
| 113560 | + ], |
| 113561 | + "SideEffects": [ |
| 113562 | + "ioc-in-logs" |
| 113563 | + ], |
| 113564 | + "Reliability": [ |
| 113565 | + "repeatable-session" |
| 113566 | + ] |
| 113567 | + }, |
| 113568 | + "session_types": false, |
| 113569 | + "needs_cleanup": null |
| 113570 | + }, |
113569 | 113571 | "exploit_solaris/dtspcd/heap_noir": { |
113570 | 113572 | "name": "Solaris dtspcd Heap Overflow", |
113571 | 113573 | "fullname": "exploit/solaris/dtspcd/heap_noir", |
|
0 commit comments