header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP Inventory v1.2 Remote (Auth Bypass) SQL Injection Vulnerability

The app is riddled with SQL Injection. For example, an attacker can send a malicious URL to the application with a crafted SQL injection payload, such as ' or 1=1--, which can be used to bypass authentication and gain access to the application. Additionally, an attacker can also perform reflected XSS attacks by sending a malicious URL with a crafted script payload, such as '><script>alert(document.cookie)</script>.

Mamboleto Joomla! component Remote File Include Vulneralbility

Mamboleto Joomla! component is vulnerable to a remote file inclusion vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mosConfig_absolute_path' parameter of the 'mamboleto.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system.

Free ASP Upload Shell Upload Vulnerability

This vulnerability allows an attacker to upload a malicious ASP shell to a vulnerable web server. The attacker can then use the shell to execute arbitrary commands on the server. The vulnerability is caused by a lack of proper validation of the uploaded file, allowing an attacker to upload a malicious ASP shell.

Joomla Component com_jphoto SQL injection vulnerability – (id)

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. The malicious request contains an SQL query that is appended to the vulnerable parameter. This allows the attacker to execute arbitrary SQL commands on the underlying database.

Joomla Component com_jsjobs Multiple SQL injection vulnerability

A vulnerability exists in Joomla Component com_jsjobs which allows an attacker to inject malicious SQL queries via the 'vm' and 'vj' parameters in the 'index.php' script. An attacker can exploit this vulnerability to gain access to sensitive information from the database.

Multiple XSS and Injection Vulnerabilities in TestLink Test Management and Execution System

Multiple injection (both XSS and SQL) vulnerabilities have been discovered in Testlink, a widely used test-case management application written in PHP. One of the XSS vulnerabilities, discovered in its login screen, can be exploited without an authenticated session.

Recent Exploits: