exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from sk

Email addresssk at scan-associates.net
First Active2002-05-23
Last Active2005-12-27
elogd260.txt
Posted Dec 27, 2005
Authored by sk | Site groundzero-security.com

elogd version 2.6.0 is susceptible to a denial of service condition when being supplied a specially crafted request.

tags | advisory, denial of service
SHA-256 | ff2eb53b60e65e0d975e0637a3dd819670e70ad64114fe5967afb04d1c7533b7
foxpro.overflow.txt
Posted Oct 4, 2002
Authored by sk | Site scan-associates.net

Scan Associates Security Advisory - Microsoft SQL Server 7.0 and 2000 with all service packs contains an exploitable buffer overflow in the OpenDataSource function when connecting to a "Microsoft Visual FoxPro Driver". Fix available here.

tags | overflow
SHA-256 | 26e594e72485ff41b1bc279d93df4f59a5b54c044de21868a546dfab542a2cbc
sql2kx2.txt
Posted Aug 13, 2002
Authored by sk | Site scan-associates.net

SQL Server 2000 remote buffer overflow exploit. Uses tcp port 1433. More information here.

tags | exploit, remote, overflow, tcp
SHA-256 | 3a6d1455f5516c79193ad22a34830d280df3ae4df2cafbc718ee266e6dbf3dca
sql2kx.c
Posted Aug 13, 2002
Authored by sk | Site scan-associates.net

SQL Server 2000 remote buffer overflow exploit. Tested against Win2ksp2. Included shellcode creates the file \scan_sql2k_bo. Fix available here.

tags | exploit, remote, overflow, shellcode
SHA-256 | d75a40dd02e1ffd0eb5451b02a8c960e2713292b3890483438f4aacc31d79964
ymxp.txt
Posted Jun 3, 2002
Authored by sk | Site scan-associates.net

Yahoo! Messenger v5,0,0,1061 buffer overflow exploit for Windows XP Pro. Shellcode spawns cmd.exe. Fix available here.

tags | exploit, overflow, shellcode
systems | windows
SHA-256 | 596e8d32292e00213f89d2811227c7e70b98b19be3b42189a13ad01d3f5aa08f
sql_injection_walkthrough.txt
Posted May 23, 2002
Authored by sk | Site scan-associates.net

SQL Injection Walkthrough - SQL injection attacks web applications by submitting raw SQL queries as input. Includes what to look for, how to test if a page is vulnerable, how to execute commands remotely, how to see the output of your SQL query, how to get data from the database using ODBC error messages, how to update/insert data into the database, and how to avoid SQL Injection.

tags | paper, web, sql injection
SHA-256 | ced0750fc6f0dfd8830e55f1c3c127b377e1c9c68ad6037544ff0d4fc23fcfb7
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close