header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla jesectionfinder LFI Vulnerability

This component for web-based business that specialises in buying and selling sections nationwide. User can add their section/property into particular listing option. Listing option manages from the backend. User selects their plan (Listing option) and enters property detail (with images). After use see that preview and make it payment. If user makes it payment successfully than it display automating otherwise their listing not published. User searches property and contact seller for more detail. The exploit is a Local File Inclusion vulnerability which allows an attacker to read arbitrary files on the server. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable server, containing the malicious payload in the 'view' parameter.

Joomla com_jejob LFI Vulnerability

A Local File Inclusion (LFI) vulnerability exists in the Joomla com_jejob component, which allows an attacker to include a file from the web server via a specially crafted URL. The vulnerable component is com_jejob, which is a job component for Joomla. The vulnerable parameter is view, which can be manipulated to include a file from the web server. The vulnerable URL is http://server/jobcomponent/index.php?option=com_jejob&view=[LFI].

Joomla je-media-player LFI Vulnerability

There is a Local File Inclusion (LFI) vulnerability in Joomla je-media-player component. An attacker can exploit this vulnerability by sending a crafted HTTP request with maliciously crafted parameters to the vulnerable application. This can allow the attacker to read sensitive files from the server.

PHPnuke 8.2 Remote Upload File Exploit

This exploit allows an attacker to upload malicious files to a vulnerable PHPnuke 8.2 website. The attacker can use the File Browser Connectors to upload any file type to the website. The uploaded file can then be accessed via the URL http://Target.com/images/uploads/File/File Name.

Advisory: Vulnerabilities in Cimy Counter for WordPress

Full path disclosure can be exploited by sending a GET request to the vulnerable URL. Redirector can be exploited by sending a GET request with malicious URL. XSS can be exploited by sending a GET request with malicious data. HTTP Response Spitting can be exploited by sending a GET request with malicious header.

Joomla Component (com_sef) RFI

A Remote File Inclusion (RFI) vulnerability exists in Joomla Component (com_sef) which allows an attacker to include a remote file by manipulating the 'mosConfig.absolute.path' parameter. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can result in the execution of arbitrary code on the vulnerable system.

Joomla JE Story submit SQL Injection

A SQL injection vulnerability exists in Joomla JE Story submit component version 1.4. The vulnerability allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is due to insufficient sanitization of user-supplied input in the 'view' parameter of the 'component/jesubmit/' URL. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable system. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information, modification of data, and other malicious activities.

Recent Exploits: