exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Next Generation Security Advisory 205012005I
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005I - IBM's DB2 database server contain four XML functions that can be used to read and write files on the system. Systems Affected: DB2 8.1.

tags | advisory
SHA-256 | b96a26b299af6b8dfd51f75246b6c5b612402295c834c9712ad99334ce4a205f

Related Files

DBCInfoTech CMS 2.0 Administrator Reinstall
Posted Aug 14, 2023
Authored by indoushka

DBCInfoTech CMS version 2.0 suffers from an unauthenticated administrator reinstall vulnerability.

tags | exploit
SHA-256 | ee4695049fa78cdc4416bf9c9d888b2f016dd969d8de33f1716e9c35a8c42a9f
Database Compilation 1.2 Cross Site Scripting
Posted Aug 7, 2023
Authored by indoushka

Database Compilation CMS version 1.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 41dfaf16a4c47fea593fb45f93fc14105292738379e4e7bfcd9673351628b411
DBD E-Commerce 2.0.6 SQL Injection
Posted Jul 31, 2023
Authored by indoushka

DBD E-Commerce version 2.0.6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7e266b432c4a53c2aa3c0144285e0731a483b8a5a8115d7ba8cdbd41c09cd4bd
DiskBoss Enterprise 11.0.24 Unquoted Service Path
Posted Feb 17, 2020
Authored by Bobby Cooke

DiskBoss Enterprise version 11.0.24 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | b8a496a749b12b6da10d73626a338d840d5337d3bd8bff7c3e415adcf76b1d04
DiskBoss Enterprise 8.4.16 Local Buffer Overflow
Posted Oct 4, 2017
Authored by C4t0ps1s

DiskBoss Enterprise version 8.4.16 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | d31cd4e67cca649797128b20d0b177cf1f83d9367ecdd996dbd04d5f317b2ff8
DiskBoss Enterprise 8.4.16 Import Command Buffer Overflow
Posted Sep 28, 2017
Authored by Touhid M.Shaikh

DiskBoss Enterprise version 8.4.16 suffers from an import command buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | d7c0ede8c236e11bbaad0ae423654cad914ee3e9daac54527d87d869ba12f6a9
DiskBoss Enterprise 8.4.16 Buffer Overflow Proof Of Concept
Posted Sep 28, 2017
Authored by Touhid M.Shaikh

DiskBoss Enterprise version 8.4.16 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | a6fdae67ed7fbf00f947fcf9d2978c0118c03da4e4413bceed8fb193d9da5b1d
DiskBoss Enterprise 8.3.12 Buffer Overflow
Posted Aug 25, 2017
Authored by Anurag Srivastava

DiskBoss Enterprise version 8.3.12 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | acb4fa7dcfe7eccbd292c4cc9ee7681e572e6a9ac6b1bd1ae8607a988cb20793
DiskBoss Enterprise 8.2.14 Buffer Overflow
Posted Aug 24, 2017
Authored by Anurag Srivastava

DiskBoss Enterprise version 8.2.14 import command buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 6789602eb6212a778f3a4532421ad55dbdc0b8ed8c312c5cf050a967d7c7ac27
MySQL / MariaDB / PerconaDB Privilege Escalation / Race Condition
Posted Nov 2, 2016
Authored by Dawid Golunski

An independent research has revealed a race condition vulnerability which affects MySQL, MariaDB and PerconaDB databases. The vulnerability can allow a local system user with access to the affected database in the context of a low-privileged account (CREATE/INSERT/SELECT grants) to escalate their privileges and execute arbitrary code as the database system user (typically 'mysql').

tags | exploit, arbitrary, local
advisories | CVE-2016-6663
SHA-256 | 01f753f3d94e735ce76518cc2e604e919a99e02cf0b9361221ae6463f8e2aed2
dbdiff Cross Site Scripting
Posted Jun 20, 2016
Authored by HaHwul

dbdiff suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | deb9dbf9c5132aac890cdebf0b63c75e07bd93380bca4dbb8e7a98efd031ee6d
DBCart SQL Injection
Posted May 20, 2010
Authored by v3n0m

DBCart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 37b2258cb27131087e6189926ec3aa5725e8d32f55b5925f5efa350bd558368b
DB[CMS] 2.01 SQL Injection
Posted May 19, 2010
Authored by Pokeng

DB[CMS] version 2.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 44234ce1854d19e521ad5231f84874ecfbff31521a75b87712cbe98d1b93adc9
NGSSoftware Insight Security Research Advisory NISR13012009
Posted Jan 14, 2009
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - Oracle has just released a fix for a flaw that, when exploited, allows a low privileged authenticated database user to gain MDSYS privileges. This can be abused by an attacker to perform actions as the MDSYS user. MDSYS.SDO_TOPO_DROP_FTBL is one of the triggers that forms part of the Oracle Spatial Application. It is vulnerable to SQL injection. When a user drops a table the trigger fires. The name of the table is embedded in a dynamic SQL query which is then executed by the trigger. Note that the Oracle advisory states that the attacker requires the DROP TABLE and CREATE PROCEDURE privileges. This is not the case and only CREATE SESSION privileges are required.

tags | advisory, sql injection
advisories | CVE-2008-3979
SHA-256 | 5121c42e5d2e8b18156a9dd21c0939cd3a695ecc1539eda09d741e19ef556402
NISR15072008.txt
Posted Jul 16, 2008
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - Oracle Application Server installs a number of PLSQL packages in the backend database server. One of these is the WWV_RENDER_REPORT package and it is vulnerable to PLSQL injection. This package uses definer rights execution and therefore executes with the privileges of the owner, in this case the highly privileged PORTAL user.

tags | advisory, sql injection
advisories | CVE-2008-2589
SHA-256 | 9b8fadd595dfccce56403731ee006274cd61e8b1f62476460b18211d7135e98e
NGS00419.txt
Posted Oct 30, 2007
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - It is possible to cause the Java Virtual Machine to overwrite an arbitrary memory location with an arbitrary value (repeatedly and in a stable manner) when parsing a malformed TrueType font. JDK and JRE versions 5.0 Update 9 and below as well as SDK and JRE versions 1.4.2_14 and below are affected.

tags | advisory, java, arbitrary
SHA-256 | 0f0ebea1254e1ec07669df846e6a69c1b0b5d28d5ec47a79fc20ee4ef9e02c1b
NGS00443.txt
Posted Oct 30, 2007
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - JDK and JRE versions 6 Update 1 and below, 5.0 Update 11 and below, and SDK and JRE versions 1.4.2_14 and below contain a vulnerability that allows an untrusted applet to violate the network access restrictions placed on it by the Java sandbox.

tags | advisory, java
SHA-256 | 9a7c6871dff0c09ab04b8fb752675bf310bc954b330129c49fbe3633fb2bc29c
NISR17102007E.txt
Posted Oct 18, 2007
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - The Oracle XML DB ftp service contains problems with auditing logins.

tags | advisory
SHA-256 | 2639ac2b24b2c8d5133eff124f15167a71fbd4375eea39277529464a214d3dce
NISR17102007D.txt
Posted Oct 18, 2007
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - The Oracle RDBMS on receiving an invalid TNS data packet will use 100% of the CPU's time introducing a denial of service condition.

tags | advisory, denial of service
SHA-256 | e7b0e95883d2072b1a56b5fdfcf4738223ad9c7c04551753f7ce3368ba5e986c
NISR17102007C.txt
Posted Oct 18, 2007
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - The Oracle TNS Listener suffers from denial of service and/or remote memory inspection vulnerabilities. Systems affected include Oracle 8.1.7.4, 10g Release 2 and 1, Oracle 9.

tags | advisory, remote, denial of service, vulnerability
SHA-256 | 2df77d5f0342cb6ee96c1251a4daebb88b481263665cf072ef864d3780bd5b37
NISR17102007B.txt
Posted Oct 18, 2007
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - The Workspace Manager in Oracle 10g release 1 and 2 and Oracle 9i is vulnerable to SQL injection. The Workspace Manager, owned by SYS, contains a package called LT. This package is owned and defined by the SYS user and can be executed by PUBLIC. LT contains a procedure called FINDRICSET which calls the FINDRICSET package in the LTRIC package. This is vulnerable to SQL injection and can be abused by an attacker to gain SYS privileges.

tags | advisory, sql injection
SHA-256 | 5df31c6c9790c218a2a5535198524baba532d40fd776334551174739a7f50ba0
NISR17102007A.txt
Posted Oct 18, 2007
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - The Intermedia application, owned by CTXSYS, contains a package called CTX_DOC. This package contains multiple SQL injection flaws.

tags | advisory, sql injection
SHA-256 | b9ba2ce84bdcab48f900e299204898570d236d962e46142d20245fc29727b497
dbdisplay-exec.txt
Posted Jul 25, 2007
Authored by hadihadi

dbdisplay.pl is susceptible to an arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
SHA-256 | 47a5e85ad83ab5cb2548a3e76210ec4cd7cb26a041537257ac1b17baf4fcb9bc
db2dos.txt
Posted Dec 15, 2006
Authored by Vivek Rathod | Site appsecinc.com

IBM's DB2 suffers from a remote denial of service condition during CONNECT processing.

tags | advisory, remote, denial of service
advisories | CVE-2006-4257
SHA-256 | e3fb513c3bd7301e0e847c155ed0caa6b969013f311609b7d19963f17e1da5d3
db2udb-handshake.txt
Posted Sep 7, 2006

An attacker can send a specially crafted ACCSEC command during the handshake process with the server, causing the server process to crash in the DB2 Universal Database versions 8.x.

tags | advisory
SHA-256 | 1a8410f5b85a180b22f0f8b9883db77dd9e57286bb5e6f8f59e05eba2bfa3d57
Page 1 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close