exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Amichai Shulman

Email addressshulman at imperva.com
First Active2004-04-19
Last Active2008-10-20
CVE-2008-4000.txt
Posted Oct 20, 2008
Authored by Amichai Shulman | Site imperva.com

PeopleTools version 8.49 suffers from a brute forcing vulnerability that bypasses the account lock-out mechanism.

tags | advisory
advisories | CVE-2008-4000
SHA-256 | 1794832b45dbd92fd22d7dfa4a7894a3017ca74fc0a57e60ed4181884fae20ed
CVE-2008-2625.txt
Posted Oct 20, 2008
Authored by Amichai Shulman | Site imperva.com

Oracle versions 8i, 9i, 10g Release 1, and 10g Release 2 suffer from an unauthenticated proxy vulnerability.

tags | advisory
advisories | CVE-2008-2625
SHA-256 | ec3cad539a775dde2997a1297f85c3d7574fae33267cd0c9794bbc00b97b00db
ajax-attack.txt
Posted Jan 4, 2007
Authored by Amichai Shulman, Guy Karlebach

Brief whitepaper discussing the hacking of AJAX DWR applications.

tags | paper
SHA-256 | 6c5d8ba8ddbd21a85894c20cb3d5862246ff8206bb67d1314a13e58a171b8c3e
OracleDBMS-TNS.txt
Posted Jan 22, 2006
Authored by Amichai Shulman | Site imperva.com

During the login process an Oracle user with no more than "create session" privileges can execute commands in the context of the special database user SYS. This of course grants any user the highest administrative privileges possible.

tags | advisory
SHA-256 | 5654f5ca442c76e942e2de9a76a7f061f6bb9e8ac7882e58e3aaf46e84d49f71
imperva.crystal2.txt
Posted Jun 9, 2004
Authored by Amichai Shulman, Moran Surf | Site imperva.com

Imperva's Application Defense Center has announced that several vulnerabilities exist in BusinessObject's Crystal Reports' Web Interface. These vulnerabilities allow a potential hacker to retrieve and delete any file from the file system of the server on which it runs, as well as causing a complete denial of service to the server. Affected versions: Crystal Reports version 9 and 10, Crystal Enterprise version 9 and 10. Exploitation details included.

tags | exploit, web, denial of service, vulnerability
SHA-256 | 08653c6229ab236fa5b5c28b167c87d32b7d71b68342d06f9afedf0d1dc76728
SQL_Injection_Evasion.pdf
Posted Apr 19, 2004
Authored by Ofer Maor, Amichai Shulman | Site imperva.com

A white paper from the Imperva Application Defense Center entitled 'SQL Injection Signature Evasion'. This paper discusses how protecting against SQL injection attacks using signatures is not enough.

tags | paper, sql injection
SHA-256 | 03d6daf972705613464988cfa766093ecc5478c6bc77a3064f497d825b56093f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close