exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 35 of 35 RSS Feed

Files Date: 2012-12-03 to 2012-12-04

Oracle MySQL Windows Stuxnet Technique SYSTEM Exploit
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Windows remote exploit that leverages file privileges to obtain a SYSTEM shell.

tags | exploit, remote, shell
systems | windows
SHA-256 | 4a2e64891b58bc7a154f2b70367e520bd51dde3d72bf67966ad91a32725a0244
Oracle MySQL 5.5.19-log Denial Of Service
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL version 5.5.19-log on SuSE Linux suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | linux, suse
advisories | CVE-2012-5614
SHA-256 | e7b152542270e8ccb148f030520930976460470f663a3f3d19c5f09cba1871f5
Oracle MySQL Privilege Escalation
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Linux suffers from a vulnerability that allows an attacker to add a new admin user.

tags | exploit
systems | linux
advisories | CVE-2012-5613
SHA-256 | d1601135651994faddfc10c91567f145058d6d888036e2073e79b83518277a4f
Oracle MySQL Heap Overrun
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Linux suffers from a heap overrun vulnerability.

tags | exploit, overflow
systems | linux
advisories | CVE-2012-5612
SHA-256 | aa61b4faa2cc9c52276bbcea35e5861199148c06c5182c06981f429b55af2c0e
Oracle MySQL Server 5.5.19-log Stack-Based Overrun
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL versions 5.5.19-log and below for Linux suffer from a stack-based overrun. This exploit yields a shell as the mysql uid.

tags | exploit, overflow, shell
systems | linux
advisories | CVE-2012-5611
SHA-256 | 5230a2630c6fb8619813731a9429b6e733b55892232e63ae4cde28452b203583
IBM System Director Remote DLL Load
Posted Dec 3, 2012
Authored by Kingcope

By sending a specially crafted request to a vulnerable IBM System Director sever, an attacker can force it to load a DLL remotely from a WebDAV share. Versions 5.20.3 and below are vulnerable.

tags | exploit
advisories | CVE-2009-0880
SHA-256 | 5b0844509e5300f20406447ea01c59ffdb5453dd39d48137328aaef28c1026af
MySQL 5.1 / 5.5 Windows Remote Root
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL versions 5.1 and 5.5 remote Windows SYSTEM level exploit.

tags | exploit, remote
systems | windows, unix
SHA-256 | f3023f8e5dad3f5eb619145479b0d58584e658bc580c2f13e14122becac5c7b0
Mandriva Linux Security Advisory 2012-176
Posted Dec 3, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-176 - A heap-buffer overflow was found in the way libxml2 decoded certain XML entities. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application. The updated packages have been patched to correct this issue.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-5134
SHA-256 | 56848c6837d5dd168d8703f830f93c6aac1b8727f6e78d33bec04ca7064d1519
Debian Security Advisory 2580-1
Posted Dec 3, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2580-1 - Jueri Aedla discovered a buffer overflow in the libxml XML library, which could result in the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2012-5134
SHA-256 | ba82ecf7261b5f9ccb47a4953b17881157f44466d3ae08228fe906291faa24db
Debian Security Advisory 2577-1
Posted Dec 3, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2577-1 - Multiple vulnerabilities were discovered in libssh by Florian Weimer and Xi Wang.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-4559, CVE-2012-4561, CVE-2012-4562
SHA-256 | dde7f32fc005ea01ee8653f47a7ddcf75c2c044d6524c2c78ec31eef012255c9
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close