exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2005-04-19

plsql_multiplestatement_injection.txt
Posted Apr 19, 2005
Authored by Esteban Martinez Fayo

Specialized exploit for cases where SQL injection is possible against a Oracle PL/SQL setup.

tags | exploit, sql injection
MD5 | e45da5398455857dcb6ca69306692fd2
oracle_sdo_code_size.c
Posted Apr 19, 2005
Authored by Esteban Martinez Fayo

Exploit for buffer overflow vulnerability in procedure MDSYS.MD2.SDO_CODE_SIZE within Oracle Database Server version 10.1.0.2 under Windows 2000 SP4.

tags | exploit, overflow
systems | windows, 2k
MD5 | 7eb1cc643d279d60af99034d31251a25
adz_serendipity.pl
Posted Apr 19, 2005
Authored by kreon | Site adz.void.ru

Serendipity 0.8beta4 beta.php SQL injection exploit.

tags | exploit, php, sql injection
MD5 | 3fb91f9270b546c0a65143f61330f813
serendipity.txt
Posted Apr 19, 2005
Authored by kreon | Site adz.void.ru

Serendipity "blog" system version 0.8beta4's "exit.php" module is vulnerable to SQL injection. Previous versions were also vulnerable, and it appears this has not yet been fixed.

tags | advisory, php, sql injection
MD5 | ad5247bf39d9fdb9aa7029a9dc7f02df
Gentoo Linux Security Advisory 200504-11
Posted Apr 19, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-11 - James Ranson reported a vulnerability when JunkBuster is configured to run in single-threaded mode, an attacker can modify the referrer setting by getting a victim to request a specially crafted URL. Tavis Ormandy of the Gentoo Linux Security Audit Team identified a heap corruption issue in the filtering of URLs. Versions less than 2.0.2-r3 are affected.

tags | advisory
systems | linux, gentoo
MD5 | f5e2d0abb958cf9ecae6768b37e3978c
dc_phpbb_xss_sql.txt
Posted Apr 19, 2005
Authored by Diabolic Crab | Site digitalparadox.org

Multiple SQL injection and Cross-site Scripting issues in phpBB versions 1.52 and below. Example exloit URLs included in advisory.

tags | exploit, xss, sql injection
MD5 | dce346b3035978e6fc023bea3968340f
dsa-707.txt
Posted Apr 19, 2005
Site debian.org

Debian Security Advisory 707-1. Multiple issues with MySQL, including: incorrect privilege handling (users get illegitimate access to databases named similarly to those they have legitimate access to), arbitrary command execution for any user that has been granted INSERT and DELETE rights, and race conditions due to predictable tempfile naming schemes.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0957, CVE-2005-0957, CVE-2005-0709, CVE-2005-0710, CVE-2005-0711
MD5 | 326422b352bdc2ac2a001bca1a7f0df5
Gentoo Linux Security Advisory 200504-10
Posted Apr 19, 2005
Authored by Gentoo | Site security.gentoo.org

Gld, a greylisting server for Postfix, is vulnerable to buffer overflows in the code contained within server.c and cnf.c. Gld is run by root by default, meaning this is a remote-root-class issue.

tags | advisory, remote, overflow, root
MD5 | 13490fee377dba4c1305666209043fa0
MSHTA_POC.c
Posted Apr 19, 2005
Authored by Zwell

Proof-of-Concept code to generate a file with an embedded CLSID, demonstrating how the issues detailed in the iDEFENSE "MSHTA" advisory, MS05-016, and other places, can be exploited.

tags | exploit
advisories | CVE-2005-0063
MD5 | 66526ae9cf6d8807e20d726865c4e389
msjet101.c
Posted Apr 19, 2005
Authored by Nanika | Site chroot.org

This is a slightly modified version of Stuart Pearson's original exploit for the malformed MDB parsing vulnerabilities in Microsoft Access.

tags | exploit, vulnerability
MD5 | 58309d996a709cef628983b1a7fb353a
dsa-706.txt
Posted Apr 19, 2005
Site debian.org

Debian Security Advisory 706-1 - The Debian Security Audit Project discovered a buffer overflow in axel, a light download accelerator. When reading remote input the program did not check if a part of the input can overflow a buffer and maybe trigger the execution of arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-0390
MD5 | 9f8fd8d6b40d0e383159337635cad0dd
zoomSQL.txt
Posted Apr 19, 2005

zOOm Media Gallery is susceptible to SQL injection attacks.

tags | advisory, sql injection
MD5 | 647ffe3d45718b25a69a75fa09221b93
Technical Cyber Security Alert 2005-102A
Posted Apr 19, 2005
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA05-102A - Microsoft has released a Security Bulletin Summary for April, 2005. This summary includes several bulletins that address vulnerabilities in various Windows applications and components. Exploitation of some vulnerabilities can result in the remote execution of arbitrary code by a remote attacker.

tags | advisory, remote, arbitrary, vulnerability
systems | windows
MD5 | 893ba0deb8f16b656f9ce1dee3d11e15
msjet40.txt
Posted Apr 19, 2005
Authored by Tal Zeltzer | Site see-security.com

Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll.

tags | exploit
MD5 | 8fbfb0d2fde9b9855da7d5229ae5341b
dokuwikiUpload.txt
Posted Apr 19, 2005
Authored by kreon | Site adz.void.ru

DoKuWiki is susceptible to a file upload bug.

tags | advisory, file upload
MD5 | fd616469fcdce36f3e0c417febc5781d
Cisco Security Advisory 20050412-icmp
Posted Apr 19, 2005
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A document that describes how the Internet Control Message Protocol (ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control Protocol (TCP) has been made publicly available. This document has been published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled ICMP Attacks Against TCP (draft-gont-tcpm-icmp-attacks-03.txt). Multiple Cisco products are affected by the attacks described in this Internet draft.

tags | advisory, denial of service, tcp, protocol
systems | cisco
MD5 | 7c317a04051ed1b14828325a84f43117
Page 1 of 1
Back1Next

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close