The Spring Framework provides a mechanism to use client provided data to update the properties of an object. This mechanism allows an attacker to modify the properties of the class loader used to load the object (via 'class.classloader'). This can lead to arbitrary command execution since, for example, an attacker can modify the URLs used by the class loader to point to locations controlled by the attacker.
A SQL injection vulnerability exists in PHP-Nuke Module print 6.0, which allows an attacker to execute arbitrary SQL commands via the 'sid' parameter in the 'modules.php?name=News&file=print' script.
Havij does not do any filtration in Target bar so XSS codes can be executed. However, you need to find a site that is vulnerable to XSS and SQL Injection. The site cannot be vulnerable to just XSS only as Havij will stop working as it cannot inject it. Functions Affected: Save in Info, Save Tables in Tables, Save Data in Tables. Eventhough I said you need to find a site that is vulnerable to XSS and SQL Injection, There is also an exception to this. Instead, you can find a site vulnerable to SQL Injection and use SiXSS to generate your desired XSS code. You can also put the XSS code after the Vulnerable Parameter. Of course, before that you would need to find the column count and string column and replace the String column with the XSS code.
An attacker can inject malicious SQL queries into the vulnerable parameter 'galid' of the 'index.php' script. By exploiting this vulnerability, an attacker can gain access to the database and extract sensitive information such as usernames, passwords, and emails.
Winamp 5.572 is vulnerable to a buffer overflow vulnerability when a maliciously crafted whatsnew.txt file is opened. This can be exploited to execute arbitrary code by overwriting the EIP and SEH registers. The exploit uses a DEP bypass technique to execute the payload.
This PoC demonstates how we can bypass ASLR by stealing a pointer off the stack and calculating the offset. Then setup the VirtualProtect() call and execute it to bypass DEP as well. All addresses are from ALSR non protected modules with BlazeDVD.
This exploit allows an attacker to add an admin account to the Planet 1.1 software. The attacker can craft a malicious HTML page with a form containing the username, password, email, mobile, site, location, and access values. When the victim visits the malicious page, the form is automatically submitted and the attacker's account is created.
The 'HEAD' command leads to SEH overwrite and ultimately remote system compromise. Tested on Windows XP SP2. SEH Overwrite and shellcode pointed out by EBP. Huge space for shellcode.
Unlimited photo upload: This software helps you to upload unlimited photo to you website. Auto Thumbnail and Auto photo aspect ratio creater: This software automatically create thumbnail of uploaded photo and also mange aspect ratio of the uploaded photo with the thumbnail photo so there will be no photo tear and also you can manage the compression rate of uploaded photo. Admin Panel: This software comes with admin panel form where you can upload photo, create category and subcategory. Categories and subcategories: Admin can create unlimited category and subcategory, it is very easy to create any number of hierarchical categories. Profile Setup: Admin can change profile form control panel, which will appear in contact us page. Password Setup: Admin can change password form their control panel. Easy Setup: Setting up this software is very easy. Just unzip the files and upload it to your server. then just set one file and you are ready to go.
This vulnerability allows an attacker to bypass authentication by using the string a' or '1'='1 for Username and Password to gain access.