Typora 0.9.9.24.6 on macOS allows directory traversal, for the execution of arbitrary programs, via a file:/// or ../ substring in a shared note via abusing URI schemes. A crafted URI can be used in a note to perform this attack using file:/// has an argument or by traversing to any directory like (../../../../something.app). Since, Typro also has a feature of sharing notes, in such case attacker could leverage this vulnerability and send crafted notes to the victim to perform any further attack.
A denial of service vulnerability exists in Cyberoam General Authentication Client 2.1.2.7 when a maliciously crafted server address is used. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.
A denial of service vulnerability exists in Cyberoam Transparent Authentication Suite 2.1.2.5 when a maliciously crafted 'NetBIOS Name' is sent to the application. An attacker can exploit this vulnerability to crash the application, resulting in a denial of service condition.
A denial of service vulnerability exists in Cyberoam Transparent Authentication Suite 2.1.2.5 when a maliciously crafted 'Fully Qualified Domain Name' is supplied. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.
A denial of service vulnerability exists in Cyberoam SSLVPN Client 1.3.1.30 when a maliciously crafted HTTP Proxy address is used. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.
A denial of service vulnerability exists in Cyberoam SSLVPN Client 1.3.1.30 when a maliciously crafted 'Connect To Server' field is sent to the application. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.
Axessh 4.2 is vulnerable to a local stack-based buffer overflow vulnerability. This vulnerability can be exploited by an attacker to execute arbitrary code on the vulnerable system. The attacker can exploit this vulnerability by sending a specially crafted malicious payload to the vulnerable application. The payload contains a malicious shellcode which is then executed on the vulnerable system. The attacker can then gain access to the system and execute arbitrary code.
This PoC exploit is for Opencart versions <= 3.0.3.2. It is a remote denial of service exploit that targets the 'extension/feed/google_base' route. It has been tested on stores with more than 1000 products added. The exploit is used by running the cartkiller.sh script with the store URL, the number of threads, and the sleep time as parameters.
This exploit is a proof-of-concept (PoC) for a vulnerability in the Windows kernel (Win32k) that allows an attacker to gain elevated privileges. The vulnerability is caused by a race condition in the win32k!NtUserSetWindowLongPtr() function, which can be exploited to gain SYSTEM privileges.
This exploit allows for medium IL javascript execution, which can be used to retrigger an IE RCE bug.