exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 61 of 61 RSS Feed

Files Date: 2012-01-18 to 2012-01-19

Apache Tomcat Large Number Denial Of Service
Posted Jan 18, 2012
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 7.0.0 through 7.0.22, 6.0.0 through 6.0.33 and 5.5.0 through 5.5.34 suffer from a denial of service vulnerability. Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.

tags | advisory, denial of service
advisories | CVE-2011-0022
SHA-256 | 91683493631ac17694efb967a6ef7a95ecd52cfe845509e1adf11897be5f34ba
Apache Tomcat Request Information Disclosure
Posted Jan 18, 2012
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 7.0.0 through 7.0.21 and 6.0.30 through 6.0.33 suffer from an information disclosure vulnerability. For performance reasons, information parsed from a request is often cached in two places: the internal request object and the internal processor object. These objects are not recycled at exactly the same time. When certain errors occur that needed to be added to the access log, the access logging process triggers the re-population of the request object after it has been recycled. However, the request object was not recycled before being used for the next request. That lead to information leakage (e.g. remote IP address, HTTP headers) from the previous request to the next request.

tags | advisory, remote, web, info disclosure
advisories | CVE-2011-3375
SHA-256 | 695b51d032225ec928c8519f49f22751af65d121b0245e9711e796b1c5d80457
UniOFuzz Universal Fuzzer Tool
Posted Jan 18, 2012
Authored by pigtail23 | Site nullsecurity.net

UniOFuzz is a universal fuzzing tool for browsers, web services, files, programs and network services/ports.

tags | tool, web, fuzzer
SHA-256 | 380fc307bd2912319ae5d082144514b94ae7530562d2f08c5340c2bf28993e12
Joomla Discussions SQL Injection
Posted Jan 18, 2012
Authored by Red Security TEAM

The Joomla Discussions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5db7194b0ccd57a0c041800cf276a1c4933a026f7a31676a9071016e2fb2adfe
Sysax Multi Server 5.50 Buffer Overflow
Posted Jan 18, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.50 create folder buffer overflow exploit with bindshell code for port 4444.

tags | exploit, overflow
SHA-256 | adb60108b3c26535f2e749d1b39e34638903b0dd0688adf1d5ebfc97c819ccc6
Vastal United SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal United suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 53121c63de9090c2c75dd23b5334eeccd5aace79531733c641f58fab563f4e51
Vastal Freelance SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal Freelance suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 538d3e0b6b518b0c64644bf1be380cbfad25f422e07bec695ab0723ed11f2f64
Vastal Games SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal Games suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5e245764721f8fffe5b143771a48786f1e1d56c91052e8ad030444729ae14f42
Vastal EzineShop SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal EzineShop suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9059b6459695ee0ef807a4671f25bad8638815a2a93dc60955fa08471a2fb8f5
pwgen Crackable Passwords
Posted Jan 18, 2012
Authored by Solar Designer

6% of pwgen passwords generated can get cracked in 2 minutes with NTLM hashes. For the MD5-based crypt(3), NTLM's 2 minutes would translate to 2 days.

tags | advisory
SHA-256 | 0cce10ca1a5989b09cd638d36869a014336958fad1337b95c08ad71bfe840357
Cloud Computing Overview And Security Issues
Posted Jan 18, 2012
Authored by Hitesh Malviya

This is a brief whitepaper that discusses an overview of cloud computing and some high level security issues associated with it.

tags | paper
SHA-256 | 4cf3f445260264a347ab53b1f5a8af4ba29d05bf285c17ec8bb75a8f92481097
Page 3 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close