exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files Date: 2023-01-03

SQLMAP - Automatic SQL Injection Tool 1.7
Posted Jan 3, 2023
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Major release bump with a large list of changes.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | aa00e08007bfdb06a362a0c2798073af8e7053a97ead8ed7cca86393a94ec2e1
Ubuntu Security Notice USN-5784-1
Posted Jan 3, 2023
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5784-1 - It was discovered that usbredir incorrectly handled memory when serializing large amounts of data in the case of a slow or blocked destination. An attacker could possibly use this issue to cause applications using usbredir to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2021-3700
SHA-256 | fd9ca84cec540a3bb0ec35959fdd292910f6e20932d87e2810d41a6d6bcc8550
Oracle DBMS_REDACT Dynamic Data Masking Bypass
Posted Jan 3, 2023
Authored by Emad Al-Mousa

Proof of concept overview on how the DBMS_REDACT Dynamic Data Masking security feature in Oracle can be bypassed. Affected versions include 19c and 21c.

tags | exploit, proof of concept, bypass
SHA-256 | faa91bafa9b2e6c720d769cabe566e32648af86218a89d1e65f2e8680b811db4
Linux PT_SUSPEND_SECCOMP Permission Bypass / Ptracer Death Race
Posted Jan 3, 2023
Authored by Jann Horn, Google Security Research

Linux suffers from two seccomp bugs with a PT_SUSPEND_SECCOMP permission bypass and ptracer death race condition.

tags | exploit
systems | linux
advisories | CVE-2022-30594
SHA-256 | 6d7f253f354c0c71a5692bbeb6bcd2a20b50e96fc05afeda0286131716d7b406
ModSecurity Backdoor Tool
Posted Jan 3, 2023
Authored by Jozef Sudolsky | Site github.com

Proof of concept remote command execution and file retrieval backdoor script for ModSecurity.

tags | tool, remote, rootkit, proof of concept
systems | unix
SHA-256 | 48d8b60d0bc4cdb2a44679ca2e1994ad76834d87845227891745d812a2dd8f7b
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close