what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 61 of 61 RSS Feed

Files Date: 2012-01-18 to 2012-01-19

Apache Tomcat Large Number Denial Of Service
Posted Jan 18, 2012
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 7.0.0 through 7.0.22, 6.0.0 through 6.0.33 and 5.5.0 through 5.5.34 suffer from a denial of service vulnerability. Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.

tags | advisory, denial of service
advisories | CVE-2011-0022
SHA-256 | 91683493631ac17694efb967a6ef7a95ecd52cfe845509e1adf11897be5f34ba
Apache Tomcat Request Information Disclosure
Posted Jan 18, 2012
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 7.0.0 through 7.0.21 and 6.0.30 through 6.0.33 suffer from an information disclosure vulnerability. For performance reasons, information parsed from a request is often cached in two places: the internal request object and the internal processor object. These objects are not recycled at exactly the same time. When certain errors occur that needed to be added to the access log, the access logging process triggers the re-population of the request object after it has been recycled. However, the request object was not recycled before being used for the next request. That lead to information leakage (e.g. remote IP address, HTTP headers) from the previous request to the next request.

tags | advisory, remote, web, info disclosure
advisories | CVE-2011-3375
SHA-256 | 695b51d032225ec928c8519f49f22751af65d121b0245e9711e796b1c5d80457
UniOFuzz Universal Fuzzer Tool
Posted Jan 18, 2012
Authored by pigtail23 | Site nullsecurity.net

UniOFuzz is a universal fuzzing tool for browsers, web services, files, programs and network services/ports.

tags | tool, web, fuzzer
SHA-256 | 380fc307bd2912319ae5d082144514b94ae7530562d2f08c5340c2bf28993e12
Joomla Discussions SQL Injection
Posted Jan 18, 2012
Authored by Red Security TEAM

The Joomla Discussions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5db7194b0ccd57a0c041800cf276a1c4933a026f7a31676a9071016e2fb2adfe
Sysax Multi Server 5.50 Buffer Overflow
Posted Jan 18, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.50 create folder buffer overflow exploit with bindshell code for port 4444.

tags | exploit, overflow
SHA-256 | adb60108b3c26535f2e749d1b39e34638903b0dd0688adf1d5ebfc97c819ccc6
Vastal United SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal United suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 53121c63de9090c2c75dd23b5334eeccd5aace79531733c641f58fab563f4e51
Vastal Freelance SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal Freelance suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 538d3e0b6b518b0c64644bf1be380cbfad25f422e07bec695ab0723ed11f2f64
Vastal Games SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal Games suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5e245764721f8fffe5b143771a48786f1e1d56c91052e8ad030444729ae14f42
Vastal EzineShop SQL Injection
Posted Jan 18, 2012
Authored by Lazmania61

Vastal EzineShop suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9059b6459695ee0ef807a4671f25bad8638815a2a93dc60955fa08471a2fb8f5
pwgen Crackable Passwords
Posted Jan 18, 2012
Authored by Solar Designer

6% of pwgen passwords generated can get cracked in 2 minutes with NTLM hashes. For the MD5-based crypt(3), NTLM's 2 minutes would translate to 2 days.

tags | advisory
SHA-256 | 0cce10ca1a5989b09cd638d36869a014336958fad1337b95c08ad71bfe840357
Cloud Computing Overview And Security Issues
Posted Jan 18, 2012
Authored by Hitesh Malviya

This is a brief whitepaper that discusses an overview of cloud computing and some high level security issues associated with it.

tags | paper
SHA-256 | 4cf3f445260264a347ab53b1f5a8af4ba29d05bf285c17ec8bb75a8f92481097
Page 3 of 3
Back123Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close