Category Archives: Full Disclosure

Full Disclosure

1 Click Extract Audio v2.3.6 – Activex Buffer Overflow

Posted by Vulnerability Lab on Jun 05

Document Title:
===============
1 Click Extract Audio v2.3.6 – Activex Buffer Overflow

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1506

Video: http://www.vulnerability-lab.com/get_content.php?id=1507

Release Date:
=============
2015-06-05

Vulnerability Laboratory ID (VL-ID):
====================================
1506

Common Vulnerability Scoring System:
====================================
6.1…

1 Click Audio Converter v2.3.6 – Activex Buffer Overflow

Posted by Vulnerability Lab on Jun 05

Document Title:
===============
1 Click Audio Converter v2.3.6 – Activex Buffer Overflow

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1504

http://www.vulnerability-lab.com/get_content.php?id=1505

View Video: https://www.youtube.com/watch?v=Ad0wHlHz0KU

Release Date:
=============
2015-06-04

Vulnerability Laboratory ID (VL-ID):
====================================
1504

Common Vulnerability…

1 Click Audio Converter v2.3.6 – Activex Buffer Overflow

Posted by Vulnerability Lab on Jun 05

Document Title:
===============
1 Click Audio Converter v2.3.6 – Activex Buffer Overflow

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1504

http://www.vulnerability-lab.com/get_content.php?id=1505

View Video: https://www.youtube.com/watch?v=Ad0wHlHz0KU

Release Date:
=============
2015-06-04

Vulnerability Laboratory ID (VL-ID):
====================================
1504

Common Vulnerability…

Broken, Abandoned, and Forgotten Code, Part 7

Posted by Zach C on Jun 04

Part 7 is up! We further refine the undocumented firmware header for
the Netgear R6200 SOHO router. A couple of additional checksum and
size fields are added as well as a packed version string field.

http://shadow-file.blogspot.com/2015/06/abandoned-part-07.html

Only 5 bytes in the 58 byte header remain unidentified, which is
sufficient for the web interface to happily accept our custom firmware
image.

Of course we haven’t started…

[CVE-2015-4051]: Beckhoff IPC diagnostics < 1.8 : Authentication bypass

Posted by The Security Factory on Jun 04

Beckhoff IPC diagnostics < 1.8 : Authentication bypass
======================================================

CVE number: CVE-2015-4051
Permalink: http://www.thesecurityfactory.be/permalink/beckhoff-authentication-bypass.html
Vendor advisory: http://ftp.beckhoff.com/download/document/IndustPC/Advisory-2015-001.pdf

— Info —

Beckhoff IPC diagnostics is support software that is preinstalled on all Beckhoff Industrial PCís (and PLCís) that…

[Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)

Posted by Pedro Ribeiro on Jun 03

Hi,

tl;dr Found lots of vulns in SysAid Help Desk 14.4, including RCE.
SysAid have informed me they all have been fixed in 15.2, but no
re-test was performed.

Full advisory below, and a copy can be obtained at [1].
5 Metasploit modules have been released and currently awaiting merge
in the moderation queue [2].

Regards,
Pedro

[1]: https://raw.githubusercontent.com/pedrib/PoC/master/generic/sysaid-14.4-multiple-vulns.txt
[2]:…

Re: Safari Address Spoofing (How We Got It)

Posted by Jeffrey Walton on Jun 02

Another simple one is:

<a href=”http://www.evil.com&quot; target=”_blank” title=”http://good.com&quot;
style=”color: rgb(0, 102, 204);”>Login <strong>HERE</strong></a>

The browsers will hide “evil.com”, and display “good.com” as a tool
tip when you hover the mouse.

The browser makers will tell you the user is not supposed to make
security decisions based on…