what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Amichai Shulman

Email addressshulman at imperva.com
First Active2004-04-19
Last Active2008-10-20
CVE-2008-4000.txt
Posted Oct 20, 2008
Authored by Amichai Shulman | Site imperva.com

PeopleTools version 8.49 suffers from a brute forcing vulnerability that bypasses the account lock-out mechanism.

tags | advisory
advisories | CVE-2008-4000
SHA-256 | 1794832b45dbd92fd22d7dfa4a7894a3017ca74fc0a57e60ed4181884fae20ed
CVE-2008-2625.txt
Posted Oct 20, 2008
Authored by Amichai Shulman | Site imperva.com

Oracle versions 8i, 9i, 10g Release 1, and 10g Release 2 suffer from an unauthenticated proxy vulnerability.

tags | advisory
advisories | CVE-2008-2625
SHA-256 | ec3cad539a775dde2997a1297f85c3d7574fae33267cd0c9794bbc00b97b00db
ajax-attack.txt
Posted Jan 4, 2007
Authored by Amichai Shulman, Guy Karlebach

Brief whitepaper discussing the hacking of AJAX DWR applications.

tags | paper
SHA-256 | 6c5d8ba8ddbd21a85894c20cb3d5862246ff8206bb67d1314a13e58a171b8c3e
OracleDBMS-TNS.txt
Posted Jan 22, 2006
Authored by Amichai Shulman | Site imperva.com

During the login process an Oracle user with no more than "create session" privileges can execute commands in the context of the special database user SYS. This of course grants any user the highest administrative privileges possible.

tags | advisory
SHA-256 | 5654f5ca442c76e942e2de9a76a7f061f6bb9e8ac7882e58e3aaf46e84d49f71
imperva.crystal2.txt
Posted Jun 9, 2004
Authored by Amichai Shulman, Moran Surf | Site imperva.com

Imperva's Application Defense Center has announced that several vulnerabilities exist in BusinessObject's Crystal Reports' Web Interface. These vulnerabilities allow a potential hacker to retrieve and delete any file from the file system of the server on which it runs, as well as causing a complete denial of service to the server. Affected versions: Crystal Reports version 9 and 10, Crystal Enterprise version 9 and 10. Exploitation details included.

tags | exploit, web, denial of service, vulnerability
SHA-256 | 08653c6229ab236fa5b5c28b167c87d32b7d71b68342d06f9afedf0d1dc76728
SQL_Injection_Evasion.pdf
Posted Apr 19, 2004
Authored by Ofer Maor, Amichai Shulman | Site imperva.com

A white paper from the Imperva Application Defense Center entitled 'SQL Injection Signature Evasion'. This paper discusses how protecting against SQL injection attacks using signatures is not enough.

tags | paper, sql injection
SHA-256 | 03d6daf972705613464988cfa766093ecc5478c6bc77a3064f497d825b56093f
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close