Sysax FTP Automation version 6.9.0 suffers from a privilege escalation vulnerability.
0d1f128c36b76104f0a93acb426524279136ba031351dd6693ec4853837a0875
This Metasploit module allows an attacker with an unprivileged windows account to gain admin access on windows system and start a shell. For this module to work, both the NSClient++ web interface and ExternalScripts features must be enabled. You must also know where the NSClient config file is, as it is used to read the admin password which is stored in clear text.
2f48ecb1ace9ab98da3fc097c685134fbbff745e68f82e7a48130c2319a63541
MedDream PACS Server versions 6.8.3.751 suffers from an unauthenticated remote code execution vulnerability. This finding has been updated as it was originally believed to required authentication.
5adb3dbf769be512c98b33fa27e9a7ba541b7e7517472634f0d21eba9f5b4c01
Rubo DICOM Viewer version 2.0 SEH buffer overflow exploit.
75c14fc5d80dadf34879715197a47a37c547aeae6b4d5c382b0da3eac500d4fd
Iperius Backup version 6.1.0 suffers from a privilege escalation vulnerability.
81444dad26eed9342fbfa06d4227a454b3785d42acfeceee83a1f32d06a61109
NSClient++ version 0.5.2.35 suffers from a privilege escalation vulnerability.
62a3b6fc7bd4e42f52edad19bdb6b0e454cf7fdb54b1614abff77a4ff5927ea6
exacqVision ESM version 5.12.2 suffers from a privilege escalation vulnerability.
d66a0d8d1b456b1de3ca4c701e03f3e11cdc8ef8a9a54bdfa32d02f33847ea3d
10-Strike Network Inventory Explorer version 8.54 local buffer overflow SEH exploit with DEP bypass.
57a8b94c1deeb8a9d66fc63b1774279eb6d8fa3ad6194ce941a3e36118d9a49c
Faleemi Desktop Software version 1.8 local SEH buffer overflow exploit with DEP bypass.
e412e8f739ae7b311746cbebf169aec5c0d59ca7fe6a307acfd7613ec19dcc8e
Code Blocks version 17.12 suffers from a local buffer overflow vulnerability.
4d3cf532522c75971d677bb97d362964d977f1fb45ef9b25d303e81ba7e772d9
RGui version 3.5.0 suffers from a buffer overflow vulnerability.
9654ff71042f9f7a24f7fc12878c647f51c08d420753309de026862f8d79d38c
Terminal Services Manager version 3.1 SEH local buffer overflow exploit.
ef05c13c249019baff4c01b24665030f69325150807beba41da28401fca3cfea
Iperius Backup version 5.8.1 suffers from a buffer overflow vulnerability.
d60ad3ada8e8321e42b48d3b8f87391b6a891a3b87a942b9aede1da924c250ca
MAGIX Music Editor version 3.1 SEH buffer overflow exploit.
718e00744407087908ea31c24cc329f693aba3141b0aeda5ba4d7affd3526422
Base64 Decoder version 1.1.2 SEH local buffer overflow exploit.
261e2ad765b0f978db4ea185f17dab928b9b2e75c945e7e11b21e039c5f4d90b
LanSpy version 2.0.1.159 SEH buffer overflow exploit with egghunter shellcode.
977bf3d4e19b303c6d59199fd8d3d828d4c60eff929c7441d38bec3b22ba8778
PrinterOn Enterprise version 4.1.4 suffers from an arbitrary file deletion vulnerability.
03bd58d699a1641571b06266f49cf4355cadc56b6f6b93031bbb8cfa2f7b8a44
R version 3.4.4 (Windows 10 x64) buffer overflow exploit with DEP and ASLR bypass.
07700acd789d612926deb573fcfa0d2c6894fed31acf844c7a33b0d0bb01c591
SynaMan version 4.0 build 1488 suffers from a cross site scripting vulnerability.
80ddac7ef57dbf7f19ca29667f0c8ddc0036d7fd55a332d11930306f2d26fad8
SynaMan version 4.0 build 1488 suffers from an SMTP credential disclosure vulnerability.
49eeb10e413f5dc28d5286dd6254ab00d1a91a02b238bb5911ca61c5255e9cfd
Splinterware System Scheduler Pro version 5.12 suffers from a buffer overflow vulnerability.
8d4d5274d57e6b6e2ac18d146600988c5a911438495615b4a0bfbe69a602d3ed
HWiNFO version 5.82-3410 suffers from a denial of service vulnerability.
3096c783d9985e49241b6f6336c9e82a4bad31f59babd5074e89e7e2455f7d2d
R version 3.4.4 suffers from a local buffer overflow vulnerability.
acafc81793e4ae219ef8dc6f3b98601dc1eba16402f54b866d76269198f62e58
Geist WatchDog Console version 3.2.2 suffers from cross site scripting, XML external entity injection, and insecure file permission vulnerabilities.
d918f241ee6c7025f29ccf1f1cb519560eb23c715777ff59995bc0cdf7a81280
GoldWave version 5.70 SEH unicode local buffer overflow exploit.
270721afc4bde6c4b82811d30af06a29aa27a552aa2bf876a3e29ada095cbf6a