Hi Hackers,
Greetings from Vishnu (@dh4wk)
1. Vulnerable Product Version:
*Blat v3.2.14*
Link: blat.net
2. Vulnerability Information
Impact: Attacker may gain administrative access / can perform a DOS
Remotely Exploitable: No
Locally Exploitable: May be possible
3.
st chance exceptions are reported before any exception handling.
This exception may be expected and handled.
41414141 ??
======
Regards,
Vishnu Raju.
___
Sent through the Full Disclosure mailing l
opl=0 nv up ei pl nz na po
nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b
efl=00010202
activationwizard!uninitialize+0x17959:
03708fd9 66833800cmp word ptr [eax],0
ds:002b:41414141=
Regards,
Vishnu Raju.
___
Sent through
ng Google OAuth are
affected irrespective of how secure they are in all other ways.
Regards,
Vishnu Raju.
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Greetings from vishnu (@dH4wk)
1. Vulnerable Product Version
- ZTE AC3633R (MTS Ultra Wifi Modem)
2. Vulnerability Information
(A) Authentication Bypass
Impact: Attacker gains administrative access
Remotely Exploitable: UNKNOWN
Locally Exploitable: YES
(B) Device crash whic