The use-after free vulnerability in Microsoft Edge can lead to memory disclosure. The vulnerability has been confirmed on Windows 10 Enterprise 64-bit (OS version 1607, OS build 14393.1198), Microsoft Edge 38.14393.1066.0, Microsoft EdgeHTML 14.14393.
The vulnerability allows an attacker to inject SQL commands.
The StartProcess method in vielib.dll in Vmware Version 6.0.0 does not check if it's being called from the application or by malicious users. This allows remote attackers to execute arbitrary code in a remote system with the actual user privileges.
The DALIM SOFTWARE ES Core 5.0 build 7184.1 is affected by multiple stored XSS and CSRF vulnerabilities. These vulnerabilities allow remote attackers to inject malicious script code into the application, which can lead to unauthorized actions or information disclosure.
This is a remote buffer overflow exploit for the corehttp[v0.5.3alpha] httpd server. The exploit takes advantage of a bug in the http.c file, specifically in the HttpSprockMake function, where a strncpy call allows for buffer overflow. This can be triggered by sending a specially crafted HTTP request to the server. The vulnerability allows an attacker to execute arbitrary code on the server.
The CVE-2017-8464 vulnerability allows remote code execution through malicious LNK files. This vulnerability is caused by the way Windows handles LNK files, allowing an attacker to execute arbitrary code when a user opens a specially crafted LNK file. This can lead to the attacker gaining control over the affected system.
The 'q' parameter in Muviko Video CMS v1.0 is vulnerable to SQL Injection. An attacker can inject malicious SQL queries in the 'q' parameter, potentially allowing them to access, modify, or delete the database.
$_REQUEST['order'] ('$this->order') parameter isn't properly sanitised, so we should be able (with MySQL version 4.1 or higher) to inject sql code in a subquery after 'ORDER by' statement...we can retrive admin credentials with BENCHMARK() function!
This vulnerability allows an attacker to pull out admin/users login credentials by exploiting a SQL injection vulnerability in the PHP123 Top Sites website. The attacker can use the following URLs to execute the exploit:- http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/admin/*- http://server.com/category.php?cat=-1/**/UNION/**/ALL/**/SELECT/**/1,concat(username,0x3a,password),3,4,5/**/FROM/**/users/*Note: The admin login can be found at /siteadmin/ and using the allintext: operator in the search query may return different results.
The SetLogFileName method in IntraProcessLogging.dll does not check if it's being called from the application or by malicious users. This allows a remote attacker to craft a HTML page and overwrite arbitrary files on the system.