header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_gameserver 1.0 (id) SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'com_gameserver' component. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server etc.

phpBB3 addon prime_quick_style GetAdmin Exploit

The vulnerability is found in the phpBB3 addon prime_quick_style. The POST parameter 'prime_quick_style' is injectable. After login, the user can manipulate the content from the 'prime_quick_style'-parameter. This will result in an update query to the USER_TABLE with the user_type set to 3 and user_permissions set to '', granting the user admin privileges.

Xstate Real Estate 1.0 (bSQL/XSS) Multiples Vulnerability

Xstate Real Estate 1.0 is vulnerable to bSQL and XSS. The vulnerable code is present in page.html (pid) and home.html (/), lands.html (/d). The PoC for bSQL is http://127.0.0.1/page.html?pid=[bSQL] and for XSS is http://127.0.0.1/home.html/[XSS] and http://127.0.0.1/lands.html/[XSS]. The demo URL for bSQL is http://demo.xstate.org/page.html?pid=1 and 1=1 TRUE and http://demo.xstate.org/page.html?pid=1 and 1=2 FALSE. The demo URL for XSS is http://demo.xstate.org/home.html/"><script>alert(document.cookie);</script> and http://demo.xstate.org/lands.html/"><script>alert(document.cookie);</script>.

Joomla Component Com_Agora Local File Inclusion Vulnerability

A vulnerability in Joomla Component Com_Agora allows an attacker to include local files on the server. This vulnerability is due to insufficient sanitization of user-supplied input to the 'page' parameter in the 'index.php' script when handling requests to the 'com_agora' component. An attacker can exploit this vulnerability by sending a malicious HTTP request to the vulnerable script. Successful exploitation will result in arbitrary local file inclusion.

Joomla Compenent Com_artportal (portalid) Remote SQL Injection Vulnerabilities

The vulnerability exists due to improper sanitization of user-supplied input in the 'portalid' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass certain security restrictions, read or modify certain data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: