WebRaider is a proof of concept quality tool to get a reverse shell out of SQL injection (MS-SQL) by using One Click Ownage.
745e39d9782621659e4b684fd301e6cd6374a5d4ec94298eadb8e858bdd7080d
Whitepaper called One Click Ownage. It discusses getting a reverse shell through SQL injection. Related scripts are in the compressed archive.
d9d69e301c64bdfe485895f78c59131d790f2e51060dcbca3dd44e46bee6d71a
ScrewTurn Wiki versions 2.0.29 and 2.0.30 suffer from a cross site scripting vulnerability.
a8b22b2a31b599e7f3474d1550177b524c414b4751b3c994b3c15034bb922359
Diigo Toolbar suffers from a global cross site scripting vulnerability.
21a323d1581282c52404d2bfe4aed45ed5fa7390089119deb2828f1987f77587
DoS Attacks Using SQL Wildcards - This paper discusses abusing Microsoft SQL Query wildcards to consume CPU in database servers.
966761136e5dd0fc10bac9d6b273966d20386567a7bdca93ac2c13e0d89fc0e9
Whitepaper describing tunneling HTTP traffic via cross site scripting channels.
b6e22346f151eaeb24916f751d3e2467742a870c86d317f9d12104eda70ce14d
XSS Shell is a powerful cross site scripting backdoor. XSS Shell allows interactively getting control over a cross site scripting (XSS) vulnerability in a web application. It demonstrates the real power and damage of cross site scripting attacks.
c411de524d741e41c5ddc25ec6179dcc18cfa0cb287e87b7c3d0fa34e180fb35
Tor Tray is a simple GUI application (C++) which enables you to load TOR in the tray, see messages, and start / stop it easily. Both binary and source code are packaged.
40d6edcaf47a55937992c960826642c79c86aa206dcfeffac48995385a8049e5
A generic problem of common personal firewall products is the allowance of shortcuts or interfaces for controlling traffic. Manipulation of these functions can allow for firewall bypass altogether. Various proof of concepts are included for products such as Zone Alarm, Kerio, Agnitium Outpost firewall, Kaspersky Anti-Hacker, Symantec's Norton Personal Firewall, and more.
0bde1ec221ee4623942f39bb82396353f8ecad9ef14dee23da7885e1887610c6
ASPRunner versions 2.x suffer from multiple vulnerabilities. Various SQL Injection, information disclosure, cross site scripting, and database download flaws exit.
49fdab9c6e54038eccdf55c5a3fa83ec824ccbc7158bd11e4f789fdb4f2b64d6
Web Wiz Forums version 7.8 is susceptible to a cross site scripting attack.
fb95299c719e87d28e1135b8c3aef3ab5dcb36a4e9f359d4685af5c1f35642cd
Blogger from Google has a cross site scripting flaw.
8a582098eeb59bd8ee61257aed05f705b240695f0136b5bdd5944e557c59a20b
Brinkster, the web hosting company, is susceptible to multiple attacks allowing remote attacker to retrieve other user's ASP source code, access to database files, and bypass of code controls.
20321697a1b31690cb24599aed57a01f74205775e8fa4851f50d9b0cbf5200ec
DotNetNuke versions 1.0.6 to 1.0.10d are susceptible to file disclosure and cross site scripting attacks.
53e05d2df3888af46549f045b457473e3f5a8930124b0e49bf694ced25fafb8e
VBulletin version 3.0 Beta 2 is susceptible to a cross site scripting vulnerability in its new member page (register.php).
82b507f123b10ff88ea31cb0f462ee386a7460f3528905be6623a60bcc1ae7b8