header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ProjectSend r754 – IDOR & Authentication Bypass Vulnerability

An insecure direct object references occured in case of an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and to access resources in the system. Insecure Direct Object References allows attackers to bypass authorization and access resources directly by modifying the value of a parameter[client] used. Thus finally point to other client account names, which allows an attackers to download others clients private data with no secure method provied.

Lock Photos Album&Videos Safe v4.3 – Directory Traversal Vulnerability

A directory traversal vulnerability has been dsicovered in the official Galaxy Studio Lock Photos Album & Videos Safe v4.3 iOS mobile application. The security vulnerability allows an attackers to unauthorized request and download local application files by usage of manipulated path parameters.

Joomla! Component MediaLibrary Basic v3.5 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component MediaLibrary Basic v3.5. An attacker can send malicious SQL queries to the application by manipulating the 'mid[0]' parameter in a 'lend_request' action or the 'view/book/19' parameter in a 'all-books' action. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Joomla! Component RealEstateManager v3.9 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component RealEstateManager v3.9. An attacker can send a malicious SQL query to the vulnerable parameter 'listing_type' or 'listing_status' in the 'search' script via the 'searchtext' parameter to execute arbitrary SQL commands in application's database.

Joomla! Component VehicleManager v3.9 – SQL Injection

Joomla! Component VehicleManager v3.9 is vulnerable to SQL Injection. This vulnerability can be exploited by sending malicious SQL queries to the vulnerable parameter. The vulnerable parameters are 'vcondition', 'transmission', 'listing_type', 'model', 'fuel_type' and 'maker'. An attacker can use these parameters to inject malicious SQL queries and gain access to the database.

Recent Exploits: