I found the same issue and more (even a DoS) in the Canon web UI:
https://www.mattandreko.com/2013/06/18/canon-y-u-no-security/
Unfortunately, Canon's response seems less than impressive. They apparently
don't really care as long as the product sells. Their response is pretty
much, "Nobody would b
Affects: Canon PIXMA MX722 Printer (and probably other Canon printers).
After typing my WPA2 WiFi password into the printer (through the
built-in hardware keypad), it exposes the cleartext password to the LAN
through an admin page that isn't password protected:
https://twitter.com/DefuseSec/statu
Document Title:
===
My Photo Wifi Share & Photo Server 1.1 iOS - Command Injection Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1232
Release Date:
=
2014-03-24
Vulnerability Laboratory ID (VL-ID):
=
Document Title:
===
iStArtApp FileXChange v6.2 iOS - Multiple Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1237
Release Date:
=
2014-03-26
Vulnerability Laboratory ID (VL-ID):
Document Title:
===
Dell SonicWall EMail Security 7.4.5 - Multiple Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1191
Dell (SonicWall) Security Bulletin:
http://www.sonicwall.com/us/shared/download/Support-Bulletin_Emai
Document Title:
===
ePhone Disk v1.0.2 iOS - Multiple Web Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1230
Release Date:
=
2014-03-25
Vulnerability Laboratory ID (VL-ID):
Hi new/old list and welcome back everybody.
Let us drop few Siemens S7 1200 bugs/fixes.
http://scadastrangelove.blogspot.com/2014/03/time-is-compressing.html
Cheers,
SCADA StrangeLove team
___
Sent through the Full Disclosure mailing list
http://nmap.or
Document Title:
===
FTP Drive + HTTP 1.0.4 iOS - Code Execution Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1231
Release Date:
=
2014-03-20
Vulnerability Laboratory ID (VL-ID):
Details
Software: WP HTML Sitemap
Version: 1.2
Homepage: http://wordpress.org/plugins/wp-html-sitemap/
CVSS: 4.3 (Medium; AV:N/AC:M/Au:N/C:N/I:P/A:N)
Description
CSRF vulnerability in WP HTML Sitemap 1.2
Vulnerability
A CSRF vulnerability exists
Document Title:
===
Lazybone Studios WiFi Music 1.0 iOS - Multiple Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1233
Release Date:
=
2014-03-21
Vulnerability Laboratory ID (VL-ID):
===
We are back to assist ...
Document Title:
===
Wireless Drive v1.1.0 iOS - Multiple Web Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1229
Release Date:
=
2014-03-19
Vulnerability Laboratory ID (VL-ID):
SEC Consult Vulnerability Lab Security Advisory < 20140328-0 >
===
title: Multiple critical vulnerabilities
product: Symantec LiveUpdate Administrator
vulnerable version: <= 2.3.2.99
fixe
Hello everyone. I am a new subscriber to this list after I heard about the
recent change in management (thanks Fyodor), so please excuse me if this is not
the most appropriate place to share this. I am a high school student interested
in computer science, mainly computer security, and I did a sc
Details
Software: GD Star Rating
Version: 1.9.22
Homepage: http://wordpress.org/plugins/gd-star-rating/
CVSS: 8.5 (High; AV:N/AC:L/Au:S/C:C/I:N/A:C)
Description
XSS, CSRF and blind SQL injection in GD Star Rating 1.9.22
Vulnerability
This plugin
Details
Software: Ajax Pagination (twitter Style)
Version: 1.1
Homepage: http://wordpress.org/plugins/ajax-pagination/
CVSS: 9.3 (High; AV:N/AC:M/Au:N/C:C/I:C/A:C)
Description
End-user exploitable local file inclusion vulnerability in Ajax
Pagination (twitter St
Warning: If you can break this probably you
can break md5 and sha1, so take care
Some people broke large SAT formulas [1] related
to a problem of Erdos with plingeling.
The md4 preimage encoding in SAT is much smaller.
The CNFs are https://j.ludost.net/md4crazy/
17b is 17 bytes preimage of zer
Hacking emails of authoritative users is usually accompanied by debates about
the identity of such email correspondence that became available on the
Internet. Until now, we thought that a correct DKIM signature indicates at the
author of the correspondence containing this signature. But can we t
> Hi Adam,
Witaj Robert,
> Quite an interesting read! Thx for preparing it.
Thank you for appreciating my work!
> So it seems to me that revealing the VM layout or SSP cookies is important
> when we're attacking application which is operating with different set of
> privileges or having access
18 matches
Mail list logo