Groupmax signatures and new updates
N-Stalker has made available the latest database update (v139) for N-Stealth Web Security Scanner.
You should be able to receive it automatically next time you execute the scanner
![]() |
to manually download it, use the url: https://secure.nstalker.com/customercenter/ |
If you need any additional assistance during this process, please, contact us at:
E-mail: support at nstalker com (24hs) or
Phone: +55-11-3675-7093 (9am to 18pm GMT-0300)
This release has included the following vulnerabilities:
– IPCop 1.4.1 Web Administration Interface Proxy Log HTML Injection Vulnerability
– Hitachi Groupmax World Wide Web Cross-Site Scripting And Directory Traversal Vulnerabilities
– YaBB 1 Gold – SP 1.3 Shadow BBCode Tag JavaScript Injection Vulnerability
– PHPCMS 1.2.1 Cross-Site Scripting Vulnerability
– PNTresMailer 6.0.3 Directory Traversal Vulnerability
– InShop and InMail Cross-Site Scripting Vulnerabilities
– KorWeblog 1.6.2-cvs Remote Directory Listing Vulnerability
– PHPNews 1.2.3 SQL Injection Vulnerability
– JSPWiki 2.1.122 Cross-Site Scripting Vulnerability
– Zwiki 0.36.2 Cross-Site Scripting Vulnerability
– NuKed-Klan 1.5 SP2 Submit Link Function HTML Injection Vulnerability
– SugarCRM 2.0.1a Multiple Input Validation Vulnerabilities
– PHPKIT 1.6.3 Multiple Input Validation Vulnerabilities
– Plain Black Software WebGUI 6.2.8 Unspecified Remote Vulnerability
– ZyXEL Prestige Router HTTP Remote Administration Configuration Reset Vulnerability
– IPBProArcade 2.5 Remote SQL Injection Vulnerability
– PHPBB 2.0.10 Remote URLDecode Command Execution Validation Vulnerability
– PHPBB 2.0.9 Login Form Multiple Input Validation Vulnerabilities
– PHPWishlist 0.1.12 Unspecified Details.PHP Database Corruption Vulnerability
– PHPMyAdmin 2.6pl2 Multiple Remote Cross-Site Scripting Vulnerabilities
N-Stealth DB General Information
Version: 139
Release Date: 12/15/2004