-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathtainted-syscall.expected.out
18 lines (14 loc) · 1.19 KB
/
tainted-syscall.expected.out
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
=======================================================================
Candidate exploit tables:
Vulnerable gadgets found per syscall and argument type:
Syscalls | Total covered |Total found where this arg has a dataflow from attacker data (% that are identity dataflows, if any)
execve | 2 | 1 (100%) | 2 (100%) | - | | |
execveat | 1 | - | 1 (100%) | 1 (100%) | - | - |
mmap | 9 | - | - | 1 (100%) | - | - | -
mprotect | 3 | - | - | - | | |
write | 8 | 1 (100%) | 1 (100%) | 1 | | |
* Syscalls not covered: mremap pwrite64 pwritev pwritev2 remap_file_pages sendfile sendmmsg sendmsg sendto writev
Vulnerable gadgets found per target application:
- tainted-syscall: 5 gadgets (100% with an iflow)
* TOTAL: 5 gadgets (100% with an iflow)
=======================================================================