exploit the possibilities
Showing 51 - 60 of 60 RSS Feed

Files Date: 2012-01-18 to 2012-01-19

Apache Tomcat Request Information Disclosure
Posted Jan 18, 2012
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 7.0.0 through 7.0.21 and 6.0.30 through 6.0.33 suffer from an information disclosure vulnerability. For performance reasons, information parsed from a request is often cached in two places: the internal request object and the internal processor object. These objects are not recycled at exactly the same time. When certain errors occur that needed to be added to the access log, the access logging process triggers the re-population of the request object after it has been recycled. However, the request object was not recycled before being used for the next request. That lead to information leakage (e.g. remote IP address, HTTP headers) from the previous request to the next request.

tags | advisory, remote, web, info disclosure
advisories | CVE-2011-3375
SHA-256 | 695b51d032225ec928c8519f49f22751af65d121b0245e9711e796b1c5d80457
UniOFuzz Universal Fuzzer Tool
Posted Jan 18, 2012
Authored by pigtail23 | Site nullsecurity.net

UniOFuzz is a universal fuzzing tool for browsers, web services, files, programs and network services/ports.

tags | tool, web, fuzzer
SHA-256 | 380fc307bd2912319ae5d082144514b94ae7530562d2f08c5340c2bf28993e12
Joomla Discussions SQL Injection
Posted Jan 18, 2012
Authored by Red Security TEAM

The Joomla Discussions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5db7194b0ccd57a0c041800cf276a1c4933a026f7a31676a9071016e2fb2adfe
Sysax Multi Server 5.50 Buffer Overflow
Posted Jan 18, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.50 create folder buffer overflow exploit with bindshell code for port 4444.

tags | exploit, overflow
SHA-256 | adb60108b3c26535f2e749d1b39e34638903b0dd0688adf1d5ebfc97c819ccc6
Vastal United SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal United suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 53121c63de9090c2c75dd23b5334eeccd5aace79531733c641f58fab563f4e51
Vastal Freelance SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal Freelance suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 538d3e0b6b518b0c64644bf1be380cbfad25f422e07bec695ab0723ed11f2f64
Vastal Games SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal Games suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5e245764721f8fffe5b143771a48786f1e1d56c91052e8ad030444729ae14f42
Vastal EzineShop SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal EzineShop suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9059b6459695ee0ef807a4671f25bad8638815a2a93dc60955fa08471a2fb8f5
pwgen Crackable Passwords
Posted Jan 18, 2012
Authored by Solar Designer

6% of pwgen passwords generated can get cracked in 2 minutes with NTLM hashes. For the MD5-based crypt(3), NTLM's 2 minutes would translate to 2 days.

tags | advisory
SHA-256 | 0cce10ca1a5989b09cd638d36869a014336958fad1337b95c08ad71bfe840357
Cloud Computing Overview And Security Issues
Posted Jan 18, 2012
Authored by Hitesh Malviya

This is a brief whitepaper that discusses an overview of cloud computing and some high level security issues associated with it.

tags | paper
SHA-256 | 4cf3f445260264a347ab53b1f5a8af4ba29d05bf285c17ec8bb75a8f92481097
Page 3 of 3
Back123Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close