An unprivileged user may be able to cause a bugcheck, or possibly execute arbitrary code by CSRSS.EXE.
An attacker can exploit this vulnerability by sending malicious SQL queries to the database server through the vulnerable web application. This can be done by appending malicious SQL statements to the vulnerable parameter in the web application. This can allow the attacker to gain access to unauthorized data or even gain access to the underlying operating system.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request contains a malicious SQL query in the 'kat' parameter which is used to extract data from the 'users' table. The malicious query is constructed using the UNION operator and the CONCAT() function to concatenate the 'name' and 'password' columns.
A SQL injection vulnerability was discovered in Immo Makler, a PHP script by Easy Laster. The vulnerability allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerable parameter is the 'id' parameter in the 'news.php' script, which can be manipulated to inject malicious SQL code. The malicious code can be used to extract data from the 'user' table, such as the version of the database, userid, name, pass, and email.
This PoC exploit enables remote management for a specific IP address on the D-Link DIR-300 router with firmware version 1.04. No need for an administrator to be logged in. The exploit is tested on Windows 7 Ultimate with Google Chrome, but will work on any other OS.
An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. The attacker can use the UNION operator to combine the results of two or more SELECT statements into a single result set. The attacker can also use the substring() function to extract information from the database.
SolarFTP 2.0 will suddenly stop (crash) while these commands were sent: APPE, GET, PUT, NLST, and MDTM. Sending USER with junk also crashing the Admin Configuration but not the service. Stack contains our junk in random. Both EIP and SEH were not overwritten.
JRadio is a powerful internet radio receiver for Joomla 1.5 based websites. An attacker can exploit this vulnerability by sending a crafted request to the server containing a malicious Local File Inclusion (LFI) payload.
A parameter is not properly sanitised before being used in a SQL query. Input passed to 'id' parameter is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Aesop is prone to a buffer overflow when handling a malicious aesop project files. The vulnerability is due to improper bounds checking of the 'Picture=' field which can be exploited by malicious people to compromise a users system.