TP-Link EAP suffers from hard-coded credential, cross site request forgery, cross site scripting, and other vulnerabilities.
>> CATEGORY: exploit
This Metasploit module exploits an uninitialized stack variable in the WMI subsystem of ntoskrnl. This Metasploit module has been tested on vulnerable builds of Windows 7 SP0 x64 and Windows…
There are several issues in drivers/char/random.c, in particular related to the behavior of the /dev/urandom RNG during and shortly after boot.
macOS/iOS ReportCrash suffers from a mach port replacement due to failure to respect MIG ownership rules.
macOS suffers from a double mach_port_deallocate in kextd due to failure to comply with MIG ownership rules.
Tpshop versions 2.0.8 and below suffer from arbitrary file download and server-side request forgery vulnerabilities.
ASUSTOR ADM versions 3.1.0.RFQ3 and below chained exploit that leverages stored cross site scripting, cross site request forgery, path traversal, and file upload vulnerabilities.
Flexense SyncBreeze versions 10.1 through 10.7 suffer from a cross site scripting vulnerability.
Flexense DiskPulse versions 10.1 through 10.7 suffer from a cross site scripting vulnerability.
WatchGuard Access Points running firmware before version 1.2.9.15 suffer from hard-coded credential, hidden authentication, file upload, and incorrect validation vulnerabilities.