exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Leandro Meiners

First Active2004-07-02
Last Active2006-05-22
CYBSEC-SAPlocal.txt
Posted May 22, 2006
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - The SAP sapdba command for Informix versions prior to 700 and version 700 up to patch number 100 is susceptible to a local privilege escalation flaw.

tags | advisory, local
SHA-256 | d0bb0296b74b8630d49c49d2a5a2b787bb7acd1aa5e70e8c1d5bfd9da9d8fd23
CYBSEC-SAPBC2.txt
Posted May 22, 2006
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - SAP BC was found to allow reading and deleting any file from the file system to which the user that the SAP BC is running as had access. The vulnerability is present in the Monitoring functionality of the SAP Adapter. Versions affected are SAP BC 4.6 and 4.7.

tags | exploit
SHA-256 | c8bc6a731b2ebaef23b185c3f666d7668b9b2e2c18e43dca79c563367958356d
CYBSEC-SAPBC.txt
Posted May 22, 2006
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - SAP BC was found to provide a vector to allow Phishing scams against the SAP BC administrator. Affected versions are SAP BC Core Fix 7 and below.

tags | advisory
SHA-256 | e4688a58b3fc3a976f7bd7797de8dc2f0af5aefdbd7c421d0bc8ed09af417d40
CYBEC_Multiple_XSS_in_SAP_WAS.txt
Posted Nov 9, 2005
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - SAP Web Application Server was found to be vulnerable to JavaScript injection, allowing for Cross-Site Scripting attacks. Three different vectors for script injection where discovered.

tags | advisory, web, javascript, xss
SHA-256 | 69ff31caa178b79091d32c07125e748ce10e868ab1c5444ef1266598fad476cf
CYBEC_Phishing_Vector_in_SAP_WAS.txt
Posted Nov 9, 2005
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - SAP Web Application Server was found to provide a vector to allow Phishing scams against SAP WAS applications.

tags | advisory, web
SHA-256 | d679b2ae35b4059539a50600ff1f5c66f96cb13efa0db3a4425d7126af04c170
CYBEC_HTTP_Response_Splitting_in_SAP_WAS.txt
Posted Nov 9, 2005
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - The SAP Web Application Server was found to be vulnerable to HTTP Response Splitting in the parameter sap-exiturl.

tags | advisory, web
SHA-256 | 13d1c2228085b242aab5052eddd24952f976cd70c35959843b192dc2681be431
lotus-disclose.txt
Posted Jul 28, 2005
Authored by Leandro Meiners | Site cybsec.com

Lotus Domino R5 WebMail versions R5, R6, and possibly R4 are susceptible to a default configuration information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | 34234d1ec904e4f9c078ad43fec5b2b46d2b151e92f5f498cdf8453683179a04
IBM-WebSphere-Edge-Server-DOS.txt
Posted Jul 2, 2004
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - A vulnerability has been discovered that allows a remote attacker to generate a denial of service condition against the IBM WebSphere Edge Component Caching Proxy. If the reverse proxy is configured with the JunctionRewrite directive being active, a remote attacker can trivially cause a denial of service by executing the GET HTTP method without parameters. Affected systems: WebSphere Edge Components Caching Proxy 5.02 using JunctionRewrite with UseCookiedirective.

tags | advisory, remote, web, denial of service
SHA-256 | a94bce55cdff38e98dc5afca9cd308f0f3e7bef5a5d9d2931d475ac1018b3c85
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close