header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component simpledownload LFI Vulnerability

A Local File Inclusion (LFI) vulnerability exists in Joomla Component simpledownload version 0.9.5 and possibly lower versions. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable application. This can allow the attacker to include and execute arbitrary local files on the vulnerable system.

File Thingie v2.5.5 File Security Bypass

There are security controls in place that attempt to prevent users from uploading PHP files and also renaming them to PHP extensions. However advanced security controls do not exist that would prevent a user from uploading a text file containing PHP code. An attacker can exploit a weakness in the file rename process allowing the attacker to rename a text file (containing code) to a .php extension and execute the script. This exploit demonstrates a way to backdoor File Thingie by uploading an *.inc file that contains a backdoored copy of File Thingie, then uploading a *.txt file containing some PHP code that will overwrite ft2.php to execute the backdoored copy of File Thingie. But first the *.txt file has to be renamed to a *.php and then executed in the browser.

Joomla Component com_camp SQL Injection Vulnerability

A SQL injection vulnerability exists in the Joomla Component com_camp, which allows an attacker to execute arbitrary SQL commands via the 'cid' parameter in a 'show' task. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can be done by appending a malicious SQL query to the 'cid' parameter in the HTTP request.

Joomla Component MS Comment LFI Vulnerability

A Local File Inclusion (LFI) vulnerability exists in Joomla Component MS Comment version 0.8.0b and possibly lower versions. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable application. This can allow the attacker to read sensitive files on the server, such as the /etc/passwd file.

Alibaba Clone Platinum (buyer/index.php) SQL Injection Vulnerability

A vulnerability exists in Alibaba Clone Platinum, where an attacker can inject malicious SQL queries into the 'ProductID' and 'BuyerID' parameters of the 'buyer/index.php' page. This can be exploited to disclose the admin credentials by using the UNION SELECT statement.

Heaven Soft CMS v 4.7 (photogallery_open.php) SQL Injection Vulnerability

A SQL injection vulnerability exists in Heaven Soft CMS v 4.7 (photogallery_open.php) which allows an attacker to execute arbitrary SQL commands via the 'cid' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application.

Recent Exploits: