This archive contains all of the 258 exploits added to Packet Storm in April, 2017.
76ce5a07783452c60fc50ebfa36851a3c75d34cb5de81ace02ff04fc340df6b3
Emby MediaServer version 3.2.5 suffers from a directory traversal vulnerability that allows for arbitrary file disclosure.
fa223b923ceaad85f3f4ca5cce4208878ae02295ea4e03a6bbab3643e2829316
Emby MediaServer version 3.2.5 suffers from a XSS issue due to a failure to properly sanitize user-supplied input to the URL path filename when handling 'not found' errors. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.
413c8dd70f63ee4e8e53a5a298b2725274507fae9766167efcdfb6194cb86cac
Emby MediaServer version 3.2.5 suffers from a password reset vulnerability.
cd55b21a8347fa5960e9af67ccc648634aed53ed1e1e824ff18218bbc68ccdbe
Emby MediaServer version 3.2.5 suffers from a blind SQL injection vulnerability. Input passed via the GET parameter 'MediaTypes' is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
5df7706831464ac9c7dd4014af6d54f5c2117a394cca94b6bb14e121d7842598
HideMyAss Pro VPN client version 3.3.0.3 for OS X suffers from a helper binary (com.privax.hmaprovpn.helper) local privilege escalation vulnerability.
37f5fa5c2d88399f63a027e0edcd1f34ea06dd428dfe8989bd994c0a70a3511e
HideMyAss Pro VPN client version 2.2.7.0 for OS X suffers from a helper binary (HMAHelper) local privilege escalation vulnerability.
afad6aec8c41a7fdc2956fc606d1e979cc75e625296147faf54c0cf49979be05
A vulnerability was found in the SyntaxHighlight MediaWiki extension. Using this vulnerability it is possible for an anonymous attacker to pass arbitrary options to the Pygments library. By specifying specially crafted options, it is possible for an attacker to trigger a (stored) cross site scripting condition. In addition, it allows the creating of arbitrary files containing user-controllable data. Depending on the server configuration, this can be used by an anonymous attacker to execute arbitrary PHP code. This issue was tested on SyntaxHighlight version 2.0 as bundled with MediaWiki version 1.28.0.
50546f158305a6607d2ea38624dad8d3ab66ba8a94154dea7e2eb2e025f51253
Tuleap versions between 8.3 and 9.6.99.86 suffer from a remote command injection vulnerability.
aa75951262599da5e40d299b63d899b5b87a79c6c4b4b9ab02c89d781c180f0f
Panda Cloud Antivirus Free version 18.0 suffers from a PSKMAD.sys denial of service vulnerability.
a6bac1e24962b0e5e457f5b1f41cfd2f18bc6f49630f5250be3fb14fadab90ef
IrfanView version 4.44 suffers from an overflow vulnerability.
733c379ee42e567d696579edf278a3b20d3e2978a16e590732cfd712a558e9a1
Live Helper Chat versions 2.06v through 2.58v suffer from a cross site scripting vulnerability.
8c2cd541af72808587c847fb2ea925e85c34d97b7a65f6b07c7762f3b0e35605
Alerton Webtalk versions 2.5 and 3.3 suffer from cross site request forgery, password hash disclosure, command injection, and login flow vulnerabilities.
be96769dc81301b02252f6d8006cd1b6c3c22bae6c57e3450ff6953e9cded4f6
There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability was confirmed on version 11.576.14393.0 (update version 11.0.38) running on Windows 10 64-bit with page heap enabled for iexplore.exe process.
149166f2d66d26f641ea07d704e2cf7bd66635da58a4980d0fd218ed33ccaddd
Simple File Uploader suffers from an arbitrary file download vulnerability.
997c4b9ae11b593d913fe5d1e54ba62c788bb4e17866a7ef3743863d6799d051
Easy File Uploader suffers from a remote shell upload vulnerability.
3352f635424a1c854fdc560ad724e93227e49110bd4e645b6b76df1decf178e9
The TYPO3 News module suffers from a remote SQL injection vulnerability.
bb71657eaa7e4ca543ead5df7415208b7f27687d4255a45a2c042482a48a7805
This Metasploit module takes advantage of custom hg-ssh wrapper implementations that don't adequately validate parameters passed to the hg binary, allowing users to trigger a Python Debugger session, which allows arbitrary Python code execution.
3acc84b6f8e63aa4048c020f1cbb6715f0ebe485e8a5e708cb011992316f75e9
This advisory describes a local privilege escalation via guest-account in LightDM found in Ubuntu versions 16.10 / 16.04 LTS.
7eb1528e323459cf945e526fa778e82b210bbab5581e8b3874acbbb6985be89b
Revive Ad Server version 4.0.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
9b20861399242f421125d6cddee8358bb6037a5865345c3a5ebdec01677a1a12
WordPress KittyCatfish plugin version 2.2 suffers from a remote SQL injection vulnerability.
a4877136efa694bcaee8945f73d5de695ee4183498b934dc7da953057347ce00
WordPress Car Rental System plugin version 2.5 suffers from a remote SQL injection vulnerability.
3034b15ff4a4dd951d6e2ebbbef527273be7831ab329280838e1bed1d54c133c
WordPress Wow Viral Signups plugin version 2.1 suffers from a remote SQL injection vulnerability.
1e7973e041daae94cfd856d15e3742257fbbfd52d3cb5da6d9efd2b63a557daf
Joomla jDBexport component version 3.2.10 suffers from cross site scripting and path disclosure vulnerabilities.
3ab8bfb5be2c4d68658ca37c0bf9e9bf28092a264d0f47d7eb35a36301253ad7
WordPress Wow Forms plugin version 2.1 suffers from a remote SQL injection vulnerability.
416ee10e980c32577e0d410f4aa3636a5a328b52e38a76eb9139197df9da9559