header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component City Portal Blind SQL Injection Vulnerability

An attacker can gain admin login credentials by exploiting a blind SQL injection vulnerability in the Joomla Component City Portal. The vulnerability can be exploited by appending a malicious SQL query to the URL. For example, an attacker can append 'and 1=0' to the URL to check if the query is valid. If the page loads without any errors, the query is valid and the attacker can append 'and 1=1' to the URL to gain access to the admin login credentials.

Joomla Component Event Manager Blind SQL Injection Vulnerability

An attacker can exploit this vulnerability to gain access to admin login credentials. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'index.php' script. An attacker can send a specially crafted HTTP request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in the back-end database. This can allow the attacker to access or modify data in the back-end database, or gain access to sensitive information such as admin login credentials.

Joomla Component com_digistore SQL injection Vulnerability

An attacker can gain admin login credentials by exploiting a SQL injection vulnerability in the Joomla component com_digistore. The vulnerability exists due to insufficient filtration of malicious characters in the 'cid[]' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to the admin login credentials.

Joomla Component com_jbook Blind SQL-injection Vulnerability

This vulnerability allows an attacker to gain access to admin login credentials. The vulnerability is caused due to the lack of proper input validation of user-supplied data. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can result in the execution of arbitrary SQL commands in the back-end database.

MOZILLA FIREFOX LOCATION BAR SPOOFING VULNERABILITY

Security researcher Jordi Chancel reported an issue similar to one fixed in mfsa2009-44 in which a web page can set document.location to a URL that can't be displayed properly and then inject content into the resulting blank page. An attacker could use this vulnerability to place a legitimate-looking but invalid URL in the location bar and inject HTML and JavaScript into the body of the page, resulting in a spoofing attack.

Schweizer NISADA Communication CMS SQL Injection Vulnerability

An SQL injection vulnerability exists in Schweizer NISADA Communication CMS. An attacker can send a maliciously crafted HTTP request to the vulnerable server, which can allow the attacker to gain access to the database and extract sensitive information such as usernames and passwords.

Recent Exploits: