exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Sumit Siddharth

Email addresssid at notsosecure.com
First Active2005-12-14
Last Active2014-01-08
Hacking XPath 2.0
Posted Jan 8, 2014
Authored by Sumit Siddharth, Thomas Forbes

This whitepaper details some novel methods of exploiting blind XPath 2.0 injection flaws that can be used to retrieve the whole document being queried (and others on the filesystem) without needing a large number of requests. It also covers exploiting some common XML databases.

tags | paper
SHA-256 | bb958f4f5dc663b2b29dda1a486d1e5c6aaa2c1a738838917678623686d2a543
Hacking Oracle From The Web
Posted Feb 23, 2010
Authored by Sumit Siddharth

Whitepaper called Hacking Oracle from the Web: Exploiting SQL Injection from Web Applications.

tags | paper, web, sql injection
SHA-256 | 79d7a613b30646f28183095a34cb7269351d1fcc8c121d569257117938cc0ca4
Oracle 10g SYS.LT.COMPRESSWORKSPACETREE SQL Injection
Posted Jul 2, 2009
Authored by Sumit Siddharth | Site notsosecure.com

Oracle 10g SYS.LT.COMPRESSWORKSPACETREE remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | e9924b3bff08566bd48f6a9c4c132a428ac601054dee9aa70008401001dc6b3c
bsqlbf-v2.1.zip
Posted Jun 23, 2008
Authored by Sumit Siddharth | Site notsosecure.com

Bsqlbf was originally written by A. Ramos from www.514.es and was intended to exploit blind sql injection against mysql backend database. This is a modified version of the same tool. It supports blind sql injection against the following databases: MS-SQL, MY-SQL, PostgresSQL, and Oracle.

tags | tool, scanner, sql injection
systems | unix
SHA-256 | c091db89e6b694d98f6c7efbfa64437271a49377901cfc83e7daae6a73b121f3
wp212-sqlinj.txt
Posted Apr 5, 2007
Authored by Sumit Siddharth | Site notsosecure.com

Wordpress version 2.1.2 xmlrpc remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 301a64d03bcf2fe9803fa9e51f792ea0e5f3fcdfad48ee40a92fcd1812328367
yahooXSS.txt
Posted Dec 28, 2005
Authored by Sumit Siddharth

Multiple bugs were discovered in Yahoo which can allow XSS and URL redirection.

tags | advisory
SHA-256 | e1e3e813dcfef49b0c3ecc32996e1eab0304d56bc11d1c5bde50e3c747dc1c0c
perl-cal-29920.txt
Posted Dec 14, 2005
Authored by Sumit Siddharth

Perl-Cal version 2.99.20, the CGI script written by Acme Software, is susceptible to cross site scripting.

tags | exploit, cgi, perl, xss
SHA-256 | 409897c86dca6af8b40a1da0d915383377f662d53d49fbe1013b03ea0ee1c830
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close