lly, after new analysis on other targets
the code seems not working as aspected.
I apologize for the mistake, the code was just removed, waiting for new
(oculated) hints.
Regards,
--
Andrea "bunker&quo
[0-day] Remote Oracle DBMS_AQ.ENQUEUE exploit (10g)
Grant or revoke dba permission to unprivileged user
Tested on "Oracle Database 10g Enterprise Edition Release 10.1.0.3.0"
AUTHOR: Andrea "bunker" Purificato
http://rawlab.mindcreations.com
DATE: Mon Apr
[After months of silence from the "HP Software Security Response Team"]
-Type: Information leak
-Risk: low
-Author: Andrea "bunker" Purificato - http://rawlab.mindcreations.com
-Description: the "ps" command (also /usr/ucb/ps) on HP OSF1 v5.1 Alpha,
developed with
On mar, 2007-02-06 at 12:44 +0100, Andrea "bunker" Purificato wrote:
> -Code: http://rawlab.mindcreations.com/codes/exp/nix/osf1true64ps.ksh
Sorry, dyslexic typo :-)
http://rawlab.mindcreations.com/codes/exp/nix/osf1tru64ps.ksh
--
Andrea "