Apache Mod_ssl vulnerability and new updates

By N-Stalker Team on May 31, 2004

N-Stalker has made available the latest database update (v127) for N-Stealth Web Security Scanner.

You should be able to receive it automatically next time you execute the scanner.
To manually download it, use the url https://secure.nstalker.com/customercenter/.
If you need any additional assistance during this process, please, contact us at:
E-mail: support@nstalker.com (24hs) or
Phone: +55-11-3675-7093 (9am to 18pm GMT-0300)

This release has included the following vulnerabilities:

– BNBT BitTorrent 7.5 Tracker Denial of Service Vulnerability
– Liferay Enterprise Portal 2.1.1 Multiple XSS Vulnerabilities
– e107 0.603 Website System Log.PHP HTML Injection Vulnerability
– phpMyFAQ 1.3.12 Action Parameter Arbitrary File Disclosure Vulnerability
– Zen Cart 1.1.2d Login.PHP SQL Injection Vulnerability
– DSM Light 2.0 Explorer.php Directory Traversal Vulnerability
– Omnicron 3.0 OmniHTTPD Get Request Buffer Overflow Vulnerability
– WebCT 4.1.1 Campus Edition HTML Tags HTML Injection Vulnerabilities
– Apache Mod_SSL SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability
– TurboTrafficTrader C 1.0 Multiple Cross-Site Scripting and HTML Injection Vulnerabilities
– VBulletin 3.0 Index.PHP Remote File Include Vulnerability
– osCommerce 2.2 File Manager Directory Traversal Vulnerability
– PHP-Nuke 7.3 Modpath Parameter Potential File Include Vulnerability
– PHP-Nuke 7.3 Multiple Input Validation Vulnerabilities
– PHPShop 0.7.1 Remote PHP Script Execution Vulnerability

N-Stealth DB General Information
Version: 127
Release Date: 05/30/2004

This entry was posted in N-Stalker Latest Updates. Bookmark the permalink.