w

Business Live Chat Software 1.0 Cross Site Request Forgery

Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability.




w

WordPress Tutor LMS 1.5.3 Cross Site Request Forgery

WordPress Tutor LMS plugin version 1.5.3 suffers from a cross site request forgery vulnerability.




w

Wing FTP Server 6.2.3 Cross Site Request Forgery

Wing FTP Server version 2.3 suffers from a cross site request forgery vulnerability.




w

QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control

QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities.




w

Edimax EW-7438RPn Cross Site Request Forgery

Edimax EW-7438RPn suffers from a cross site request forgery vulnerability.




w

Hospitals Must Secure Vital Backend Networks Before It's Too Late




w

Cisco Data Center Network Manager Unauthenticated Remote Code Execution

DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why).




w

WordPress Event-Registration 5.43 Arbitrary File Upload

WordPress Event-Registration plugin version 5.43 suffers from an arbitrary file upload vulnerability.



























w

Microsoft Windows NtUserMNDragOver Local Privilege Escalation

This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call. The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNGetpItemFromIndex(), where the NULL pointer dereference will occur. This module has been tested against Windows 7 x86 SP0 and SP1. Offsets within the solution may need to be adjusted to work with other versions of Windows, such as Windows Server 2008.