Integer overflows occur in libtransmission due to the tr_new/tr_new0 allocation wrappers not handling overflow. This can be exploited by creating a list containing empty dictionaries, which can cause an integer overflow when parsing the files dictionary. This can also occur when parsing the announce, urllist, and pieces dictionaries.
This exploit is a buffer overflow vulnerability in the Stage4_() function. It allows an attacker to write arbitrary data to a buffer, which can be used to execute malicious code. The exploit uses the sysctlbyname function to read the machdep.openpsid value, which is then used to open the /dev/bpf0 device. The exploit then uses the ioctl function to write to the device, which can lead to a buffer overflow.
An issue was discovered in armadito-windows-driver/src/communication.c affecting Armadito 0.12.7.2 and previous versions. Malware with filenames containing pure UTF-16 characters can bypass detection. The user-mode service will fail to open the file for scanning after the conversion is done from Unicode to ANSI.
This exploit is a memory corruption vulnerability in the NtAllocateVirtualMemory function in Windows. It allows an attacker to execute arbitrary code in the context of the current user. The exploit uses a shellcode to map memory in userspace and write the shellcode to the mapped memory.
This exploit is related to NXFS-709fd562-36b5-48c6-9952-302da6218061 Local Privilege Escalation Vulnerability. It is a vulnerability in the NXFS-709fd562-36b5-48c6-9952-302da6218061 driver which allows an attacker to gain SYSTEM privileges. The exploit uses a token stealing shellcode to gain SYSTEM privileges. It uses DeviceIoControl to send the shellcode to the driver and then executes it.
Trend Micro's website states that:[1] Encryption for Email Gateway is a Linux-based software solution providing the ability to perform the encryption and decryption of email at the corporate gateway, regardless of the email client, and the platform from which it ori
A SQL injection vulnerability exists in Joomla! Component OS Property Real Estate 3.12.7. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to gain access to unauthorized information or to manipulate data. The vulnerable parameter is 'cooling_system1', 'heating_system1' and 'laundry' which can be found in the URL http://localhost/[PATH]/os-property-layouts/search-tools/advanced-search?&option=com_osproperty&task=property_advsearch.
A vulnerability in Joomla! Component Proclaim 9.1.1 allows an attacker to upload arbitrary files to the server. This is due to the lack of proper validation of the uploaded file type. An attacker can exploit this vulnerability by uploading a malicious file to the server and then executing it.
A SQL injection vulnerability exists in Joomla! Component CheckList 1.1.1. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in application's database. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the affected parameter.
Joomla! Component Alexandria Book Library 3.1.2 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'letter' in the 'index.php' file. This can allow the attacker to gain access to the database and execute arbitrary code.