what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 76 RSS Feed

Files

Oracle MySQL Heap Overrun
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Linux suffers from a heap overrun vulnerability.

tags | exploit, overflow
systems | linux
advisories | CVE-2012-5612
SHA-256 | aa61b4faa2cc9c52276bbcea35e5861199148c06c5182c06981f429b55af2c0e

Related Files

MySQL 5.1 / 5.5 Windows Remote Root
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL versions 5.1 and 5.5 remote Windows SYSTEM level exploit.

tags | exploit, remote
systems | windows, unix
SHA-256 | f3023f8e5dad3f5eb619145479b0d58584e658bc580c2f13e14122becac5c7b0
MySQL Squid Access Report 2.1.4 HTML Injection
Posted Jul 23, 2012
Authored by Daniel Godoy

MySQL Squid Access Report version 2.1.4 suffers from an html injection vulnerability.

tags | exploit
SHA-256 | 9ef08e7e97feb92f78a981eb4bf8bf5381847ef326753e6e48890bc57bb3df6e
MySQL Remote Root Authentication Bypass
Posted Jun 12, 2012
Authored by Sergei A. Golubchik, David Kennedy

MySQL remote root authentication bypass exploit.

tags | exploit, remote, root
systems | linux, debian
advisories | CVE-2012-2122
SHA-256 | fa8a07437a078edcac9f7f432c70a04cd4fc7c1f42f36d254d4fa9efe0c46b18
MySQLDumper 1.24.4 LFI / XSS / CSRF / Code Execution / Traversal
Posted Apr 27, 2012
Authored by Akastep

MySQLDumper version 1.24.4 suffers from code execution, cross site request forgery, cross site scripting, local file inclusion, and directory traversal vulnerabilities.

tags | exploit, local, vulnerability, code execution, xss, file inclusion, csrf
SHA-256 | e6b0a6d0eb5642150f170e010552ff83ed91020020af670d6d374c55c6a6add5
MySQL 5.5.8 Denial Of Service
Posted Dec 25, 2011
Authored by Level

MySQL version 5.5.8 remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | e47dc3eb176f47a4d695cb60327c8ceca93506e42b7b61b174b504ddbbd485fd
MySQL.com Blind SQL Injection
Posted Mar 27, 2011
Authored by Jackh4xor

MySQL.com suffered from a remote blind SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | c12cb947f8d7991ebab12da7bd232f56b1ba2144aa99196a42cfff37298a17fb
Oracle MySQL for Microsoft Windows Payload Execution
Posted Mar 9, 2011
Authored by Bernardo Damele, todb | Site metasploit.com

This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the SELECT ... into DUMPFILE method of binary injection. On default Microsoft Windows installations of MySQL (=< 5.5.9), directory write permissions not enforced, and the MySQL service runs as LocalSystem. NOTE: This Metasploit module will leave a payload executable on the target system when the attack is finished, as well as the UDF DLL, and will define or redefine sys_eval() and sys_exec() functions.

tags | exploit
systems | windows
SHA-256 | f8fac6ece5e7759e092fdf7d42b1c758a65c1c18f72811b790103380f29a9be0
Advanced MySQL Exploitation
Posted Jan 10, 2011
Authored by Muhaimin Dzulfakar

Whitepaper called Advanced MySQL Exploitation.

tags | paper
SHA-256 | eeed1189d006c0343e26e681e5c40d6acc19a93e76346607fc677f073a104192
MySQL Injection - Simple Load File And Into OutFile Tutorial
Posted Aug 13, 2010
Authored by MikiSoft

This is a short tutorial called MySQL Injection - Simple Load File and Into OutFile.

tags | paper, sql injection
SHA-256 | 6866aa8f28dcac6458750046b3125a824fcea99b3aedbddd27f63076b1098e76
MySQL Injection Whitepaper
Posted Jun 14, 2010
Authored by s4r4d0

Whitepaper on MySQL Injection.

tags | paper, sql injection
SHA-256 | 47f2ac228809e1ca8b66fa4d0e2d9a834001be7702c8081a84dd3e6aa422e3fc
MySQL Injection Tutorial
Posted Apr 23, 2010
Authored by fvox

Whitepaper called MySQL Injection Tutorial. Written in Portuguese.

tags | paper, sql injection
SHA-256 | 0df4af51e4285ae2d4430f8a8cdfd67da28e3b64df5895574861a008661dad06
MySQL yaSSL CertDecoder::GetName Buffer Overflow
Posted Feb 6, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the yaSSL (1.9.8 and earlier) implementation bundled with MySQL. By sending a specially crafted client certificate, an attacker can execute arbitrary code. This vulnerability is present within the CertDecoder::GetName function inside ./taocrypt/src/asn.cpp. However, the stack buffer that is written to exists within a parent function stack frame. NOTE: This vulnerability requires a non-default configuration. First, the attacker must be able to pass the host-based authentication. Next, the server must be configured to listen on an accessible network interface. Lastly, the server must have been manually configured to use SSL. The binary from version 5.5.0-m2 was built with /GS and /SafeSEH. During testing on Windows XP SP3, these protections successfully prevented exploitation. Testing was also done with mysql on Ubuntu 9.04. Although the vulnerable code is present, both version 5.5.0-m2 built from source and version 5.0.75 from a binary package were not exploitable due to the use of the compiler's FORTIFY feature. Although suse11 was mentioned in the original blog post, the binary package they provide does not contain yaSSL or support SSL.

tags | exploit, overflow, arbitrary
systems | linux, windows, ubuntu
SHA-256 | 868f484555ca4e2ef05eee6be5d7e2e2ec89c6ff75cf71a830c02560e0887213
MySQL yaSSL SSL Hello Message Buffer Overflow
Posted Jan 27, 2010
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the yaSSL (1.7.5 and earlier) implementation bundled with MySQL <= 6.0. By sending a specially crafted Hello packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-0226
SHA-256 | 8b56d9e271eea43f1c56b4b45991c680b198e3681ff3e9ad94e03dd50625addc
MySQL yaSSL SSL Hello Message Buffer Overflow
Posted Oct 27, 2009
Authored by MC

This Metasploit module exploits a stack overflow in the yaSSL (1.7.5 and earlier) implementation bundled with MySQL versions 6.0 and below. By sending a specially crafted Hello packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-0226
SHA-256 | 06f5a48bebc46ac67880ab01c20b9c8364bb1d058a880b53cb7c21ec66b5eedf
SQL Injection Write Up In Indonesian
Posted Sep 22, 2009
Authored by Gonzhack

Brief whitepaper discussing SQL injection in MySQL. Written in Indonesian.

tags | paper, sql injection
SHA-256 | 19938f7e92bbeb6464cfd177e05a082c218aaa070c80f9de4fbf08073411fca5
MySqloit SQL Injection Takeover Tool
Posted Sep 2, 2009
Authored by Muhaimin Dzulfakar | Site code.google.com

MySqloit is a SQL Injection takeover tool focused on LAMP (Linux, Apache, MySQL, PHP) and WAMP (Windows, Apache, MySQL, PHP) platforms. It has the ability to upload and execute Metasploit shellcodes through the MySQL SQL Injection vulnerabilities.

tags | tool, scanner, php, vulnerability, shellcode, sql injection
systems | linux, windows, unix
SHA-256 | 97e06597309a5714f14fba6fa3ea6ae49105d79129f7455ebc3be206b0cab04a
MySQL 5.0.45 Format String Vulnerability
Posted Jul 8, 2009
Authored by Kingcope

MySQL version 5.0.45 suffers from a format string vulnerability. Proof of concept demonstration code is provided.

tags | exploit, proof of concept
SHA-256 | 2d52aab1c12be86bae2773c2634920d09db2b48caae9a13142cc7e61c1976c38
MySQL: Secure Web Apps - SQL Injection Techniques
Posted Mar 9, 2009
Authored by Omnipresent

Whitepaper called MySQL: Secure Web Apps - SQL Injection Techniques.

tags | paper, web, sql injection
SHA-256 | 0930f3a77eb458da8c9b9a814769e7cd4e1235ac3871a8c0be819bd5167283ff
MySQL SHA1 Hash Brute Forcer
Posted Feb 3, 2009
Authored by thebug | Site ulissescastro.wordpress.com

MySQL double SHA1 hash wordlist brute forcer written in Python.

tags | exploit, python
SHA-256 | afcfbc5a783d545c8a6a3404d7e232dda3fe4597586a7315883e33e42402ab41
MySQL Version 3.23 Wordlist Cracker
Posted Jan 26, 2009
Authored by d3hydr8, rsauron | Site darkc0de.com

MySQL version 3.23 hash wordlist cracking utility written in Python.

tags | cracker, python
SHA-256 | 6773da8b007a1b761b04d1a7a42a40337d23fcb1d34eec0641e2de2c5c59273f
MySQL Version 5 Wordlist Cracker
Posted Jan 26, 2009
Authored by d3hydr8 | Site darkc0de.com

MySQL version 5 hash wordlist cracking utility written in Python.

tags | cracker, python
SHA-256 | bece4dda62e10bba5c85577081a3cd915d714d07556356d223bf79971820a267
mysqlquickadmin-lfi.txt
Posted Nov 7, 2008
Authored by Vinod Sharma

MySQL Quick Admin version 1.5.5 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 634617d7adea7453287a9ccd2c0ea33899100d0b0389c13bc8bdff9f194fd174
mySQLFUZZer.tar.gz
Posted Oct 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Quick little MySQL fuzzing utility that creates sockets and fuzzers on the fly.

tags | fuzzer
SHA-256 | 15405e4927cb4b5b834139904c6fa76a7c7a2d33cfddb4d8878f3376b025779e
mysqlquick-lfi.txt
Posted Oct 1, 2008
Authored by JosS | Site spanish-hackers.com

MySQL Quick Admin versions 1.5.5 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 2ad181de80cb9d0e27584a64dc336c408fb7f7b8cfa161472744ed4f4cf83315
mysql-truncate.txt
Posted Sep 12, 2008
Site 80sec.com

Short write up discussing MySQL character set truncation vulnerabilities.

tags | paper, vulnerability
SHA-256 | 1553a1e8d1d0ff34395194b38aa66753f806fd86e6b26acf190557782c16897b
Page 2 of 3
Back123Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close