lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B117BBF.9060209@uni.it>
Date: Sat, 28 Nov 2009 20:36:31 +0100
From: Andrea Purificato <a.purificato@....it>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Oracle exploit for CTXSYS.DRVXTABC.CREATE_TABLES
	and others

Hi!
I've just released the working exploit for CTXSYS.DRVXTABC.CREATE_TABLES
injection on Oracle DB 9i/10g (CVE-2009-1991)

You can find the code on my site, http://rawlab.mindcreations.com

In particular,

Classic SQL injection:
http://rawlab.mindcreations.com/codes/exploit/oracle/ctxsys-drvxtabc-create_tables.sql

Cursor injection:
http://rawlab.mindcreations.com/codes/exploit/oracle/ctxsys-drvxtabc-create_tablesV2.sql

Into the site you can find exploits for COMPRESSWORKSPACETREE,
REMOVEWORKSPACE and MERGEWORKSPACE injections (SYS.LT) too.

Regards,
-- 
Andrea "bunker" Purificato

Ethical Hacker @ Unidata S.p.A.
http://rawlab.mindcreations.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ