header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component Jfeedback! Local File Inclusion Vulnerability

A local file inclusion vulnerability exists in the com_jfeedback version 1.2 component of Joomla. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains a malicious file path which is then included in the vulnerable application. This can allow an attacker to gain access to sensitive information stored on the server.

Joomla Component Ticketbook Local File Inclusion Vulnerability

A local file inclusion vulnerability exists in the com_ticketbook version 1.0.1 component for Joomla. An attacker can exploit this vulnerability to include arbitrary local files on the vulnerable system. This is done by sending a specially crafted HTTP request to the vulnerable system, which contains directory traversal characters followed by the file name of the file to be included. This can be exploited to disclose sensitive information, such as the /etc/passwd file.

Joomla Component TweetLA! Local File Inclusion Vulnerability

A Local File Inclusion (LFI) vulnerability exists in Joomla Component TweetLA! version 1.0.1. An attacker can exploit this vulnerability to include arbitrary files from the local system, which may lead to the disclosure of sensitive information. The vulnerability is due to insufficient sanitization of user-supplied input to the 'controller' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable script. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information, which may aid in launching further attacks.

MediaInSpot CMS LFI Vulnerability

A Local File Inclusion (LFI) vulnerability exists in MediaInSpot CMS, which allows an attacker to include a file from the local file system of the web server. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. The vulnerable parameter is ‘page’, which can be used to include a file from the local file system of the web server. An attacker can include the ‘/etc/passwd’ file by sending a maliciously crafted HTTP request to the vulnerable application.

Kiasabz Article News CMS Magazine SQL Injection Vulnerability

Kiasabz Article News CMS Magazine is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable web application. This can be done by appending malicious SQL queries to the vulnerable URL parameters. For example, http://127.0.0.1/Kiasabz/essay.php?essaycategory=' is vulnerable to SQL injection.

joomla component allvideos BLIND SQL injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the URL. This can allow an attacker to gain access to the database and execute arbitrary SQL queries.

Recent Exploits: