Category Archives: Full Disclosure

Full Disclosure

Shakacon 2015 Last Call for Papers (July 6-9 2015, Honolulu, Hawaii)

Posted by Jonathan Brossard on Feb 12

—-++++++++++++++++++++++++++++++++++++—-
Shakacon VII – Honolulu, Hawaii

“Sun, Surf, and C Shells”

CALL FOR PAPERS

www.shakacon.org/CFP2015.html
—-++++++++++++++++++++++++++++++++++++—-

Who: Shakacon Crew
What: Shakacon VII
When: July 6-7 (Training) & July 8-9 (Conference) 2015
Where: Honolulu, HI – Hawaii Prince Hotel Waikiki
Why: World Class Speakers,…

[ANN] MSKB 3004375 available for Windows 2000 and later too (but NOT from Mcirosoft)

Posted by Stefan Kanthak on Feb 12

Hi @ll,

yesterday Microsoft published the security advisory 3004375
<https://technet.microsoft.com/en-us/library/security/3004375>
announcing an update which enables Windows 7 and newer to log
the command lines used to start processes to the event log.

If you want to have this functionality on older versions of
Windows too see <http://home.arcor.de/skanthak/appinit.html>
(but notice the license terms).

Limitation: command lines of…

Re: Major Internet Explorer Vulnerability – NOT Patched

Posted by Sijmen Ruwhof on Feb 12

Hi Joey,

In my research I found out that the ‘x-frame-options’ solution doesn’t
protect against session hijacking via session cookie theft. It is very
important that you also need to add ‘HttpOnly’ flags on all cookies.

I’ve published an overview of my research, additional mitigations and
supporting evidence in a web log article:

http://sijmen.ruwhof.net/weblog/427-mitigations-against-critical-universal-c

CVE-2014-6412 – WordPress (all versions) lacks CSPRNG

Posted by Scott Arciszewski on Feb 12

Ticket opened: 2014-06-25
Affected Versions: ALL
Problem: No CSPRNG
Patch available, collecting dust because of negligent (and questionably
competent) WP maintainers

On June 25, 2014 I opened a ticked on WordPress’s issue tracker to expose a
cryptographically secure pseudorandom number generator, since none was
present (although it looks like others have tried to hack together a
band-aid solution to mitigate php_mt_seed until WordPress gets…

MooPlayer 1.3.0 'm3u' SEH Buffer Overflow POC

Posted by Samandeep Singh on Feb 12

MooPlayer 1.3.0 ‘m3u’ SEH Buffer Overflow POC

#!/usr/bin/env python
##########################################################################################
# Exploit Title: MooPlayer 1.3.0 ‘m3u’ SEH Buffer Overflow POC
# Date Discovered: 09-02-2015
# Exploit Author: Samandeep Singh (@samanL33T )
# Vulnerable Software: Moo player 1.3.0
# Software Link: https://mooplayer.jaleco.com/
# Vendor site:…

Radexscript CMS 2.2.0 – SQL Injection vulnerability

Posted by ITAS Team on Feb 12

#Vulnerability title: Radexscript CMS 2.2.0 – SQL Injection vulnerability
#Vendor: http://redaxscript.com/
#Product: Radexscript CMS
#Software link: http://redaxscript.com/download/releases
#Affected version: Redaxscript 2.2.0
#Fixed version: Redaxscript 2.3.0
#CVE ID: CVE-2015-1518
#Author: Pham Kien Cuong (cuong.k.pham () itas vn) & ITAS Team (www.itas.vn)

:: PROOF OF CONCEPT ::

POST /redaxscript/ HTTP/1.1
Host: target.local
User-Agent:…

T-Mobile Internet Manager – DLL Hijacking (mfc71enu.dll)

Posted by Vulnerability Lab on Feb 11

Document Title:
===============
T-Mobile Internet Manager – DLL Hijacking (mfc71enu.dll)

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1427

Release Date:
=============
2015-01-29

Vulnerability Laboratory ID (VL-ID):
====================================
1427

Common Vulnerability Scoring System:
====================================
5.6

Product & Service Introduction:…

Pandora FMS v5.1 SP1 – SQL Injection Web Vulnerability

Posted by Vulnerability Lab on Feb 11

Document Title:
===============
Pandora FMS v5.1 SP1 – SQL Injection Web Vulnerability

References (Source):
====================
http://vulnerability-lab.com/get_content.php?id=1355

Release Date:
=============
2015-02-09

Vulnerability Laboratory ID (VL-ID):
====================================
1355

Common Vulnerability Scoring System:
====================================
6.3

Product & Service Introduction:
===============================…