Hewlett Packard TouchSmart Calendar Service version 4.1.4245 suffers from a privilege escalation vulnerability.
3ac401606b82093bdf7d0f6ed07c11956a60eeff288f08c6ee1a8ff970f7d3a8
Boonex Dolphin versions 7.3 and below suffer from an authentication bypass vulnerability.
4658d77329bd114fa95331dde278b6549957a93549ef1cd5bc18ffce0cce9541
task_t should be considered harmful and can lead to many XNU elevations of privilege.
0c7485685996e007a105a58f511a032918e4823a30285759e8c6228026ef145c
Komfy Switch with Camera DKZ-201S/W suffers from a wifi password disclosure vulnerability.
2da0e907e5d7be055bcb38088af54f4f1eb0cc34e40a905e6567878159a08836
SmallFTPd version 1.0.3 suffers from a mkd command denial of service vulnerability.
fa4ff306f7fbdcb83d7b886e6ee4d9a7b3a392048f65279003d6fb7e02362261
BigTree CMS version 4.2.13 suffers from a cross site request forgery vulnerability.
85a2cfd2a1bc40c7a4881a325ba67c796d3788fdcc55f5821e62f64dd87ed4b8
HP Thin Pro OS suffers from a local privilege escalation vulnerability.
0ee10977a6f7daadc40f2e6b00a75969714bf8ae7c6cb97b6a1034e28806b3dc
Mac OS X and iOS kernels suffer from a use-after-free vulnerability in IOSurface.
cab947c5829745a9dc2e51fbb1535572f84a96ed53d059d6709dbadfcef94a30
The Mac OS X kernel suffers from a use-after-free vulnerability. in IOBluetoothFamily.kext.
171e7e87f8a2e1db0040d43d705559a25b69ab0a6f469ad2e2cb08be3384709b
Network Scanner version 4.0.0.0 SEH overflow exploit.
85c3395f61aff99ba26155551063c1e183aaf9399f6541a8426dcf9216803c46
CVSNT version 2.0.51d suffers from a privilege escalation vulnerability.
bd42061680479a26abdaf539732cd1096462c3b0dcbe85c1995ff9e67859af8a
WinCvs version 2.1.1.1 (Build 1) suffers from a privilege escalation vulnerability.
18ae46b8299cd97ae54ac95a37a13d566380fffa934ee55ecb0785bcac11e0f9
Adobe Reader version 9.3.0 suffers from a dll hijacking vulnerability.
f90e3c0f992ec4e0cfa7fbddb5fca2f89595f052320192022511e6350463b148
daloRADIUS version 0.9-9 suffers from remote SQL injection and code execution vulnerabilities.
3c8c8ec1b002beb2cd7d9db0731dfaadd8413286543e67b0e2825561f723a732
Apple macOS version 10.12.1 and iOS version 10 suffer from man-in-the-middle and denial of service issues with SecureTransport SSL handshakes.
dd040da5d731f7a4c679a12a2eae20eaa3b0971446f0a9d2625d0635e6c07f4f
Microsoft Windows x86 NDISTAPI privilege escalation exploit that leverages the vulnerability outlined in MS11-062.
fd44381a9fc5685d9a01998dfd8619f8fcf75a3a8c328dc5d068b277cf421391
Orange Inventel LiveBox version 5.08.3-sp suffers from a cross site request forgery vulnerability.
eecefdbefe2436681dd622fee377d3178c9d9d0d2b1f6bfc585ffd11969c971e
EC-CUBE version 2.12.6 suffers from a server-side request forgery vulnerability.
c42ba6db20bf772a4bcc9224c08de1ef016065fe9006bd2eaeef8a403bde4674
Zenbership version 1.07 suffers from cross site request forgery, and cross site scripting vulnerabilities.
81340124a76fe2a5a7d4dec3db4486ca35c4241fd5660741899f64e8bb3fd0f4
GIU Gallery File version 1.0.2 suffers from a remote SQL injection vulnerability.
b8f723cdcc8c2ce3cabf2b22637f9fb354de4ff0d5d2f4672a49c97cf9b1f705
Industrial Secure Routers versions EDR-G903, EDR-G902, and EDR-G903 allow for unauthenticated administrative access.
77e309240343fb2928ef90a3201ea3009abdf042c31b5cedfedc0f7c2312aff9
PSEvents.exe within several Panda Security products runs hourly with SYSTEM privileges. When run, it checks a user writable folder for certain DLL files, and if any are found they are automatically run. Vulnerable products include Panda Global Protection 2016 versions 16.1.2 and below, Panda Antivirus Pro 2016 versions 16.1.2 and below, Panda Small Business Protection versions 16.1.2 and below, and Panda Internet Security 2016 versions 16.1.2 and below.
675a9794c4c179230ddd016c62462e8da69b4d5e807de5679903fd32ada74613
TrendMicro InterScan Web Security Virtual Appliance remote code execution exploit that leverages the shellshock vulnerability to spawn a connect-back shell. TrendMicro has contacted Packet Storm and provided the following link with patch information: <a href="https://success.trendmicro.com/solution/1105233">https://success.trendmicro.com/solution/1105233</a>
7eefbb330b7be36adf17cb7725410f679d2aeac775a9e31cf85234029e4b66cc
Puppet Enterprise Web Interface versions prior to 2016.4.0 suffer from a user enumeration vulnerability.
54d7ee759e692370673e959d8a665bb7bb0ccdcfb52e28fb2e44109f9eda1fc7
Puppet Enterprise Web Interface versions prior to 2016.4.0 suffer from an open redirection vulnerability.
b98c74f7649da779a08cd2eca2a2e14d384928318bd554d0497d39c7da5a823b