header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component webERPcustomer Local File Inclusion

webERPcustomer component for Joomla! is prone to a local file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary local files from the web server and execute arbitrary code within the context of the vulnerable application.

Joomla Component User Status Local File Inclusion

The component back end allows the entry of locations. Also assigning users to a location is done in the back end. Users that are not assigned a location do not show up in the User Status Screen. After creating locations and assigning users, an attacker can exploit the vulnerability by sending a crafted URL to the vulnerable application, such as http://127.0.0.1/index.php?option=com_userstatus&controller=../../../../../../../../../../etc/passwd%00, which will allow the attacker to view sensitive information from the server.

Joomla Component EContent Local File Inclusion

A vulnerability exists in EContent Joomla Component version 1.0.1 which allows an attacker to include a local file by manipulating the 'controller' parameter in a GET request. An attacker can exploit this vulnerability to include a local file, such as the /etc/passwd file, and view its contents.

Simply Sites RGV Local File Inclusion

Simply Sites RGV is vulnerable to Local File Inclusion vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The maliciously crafted request contains a maliciously crafted page_id parameter which contains a relative path to the file which the attacker wants to include. For example, an attacker can send a maliciously crafted request like http://127.0.0.1/payment.php?page_id=../../../../../../../../etc/passwd to include the /etc/passwd file.

Joomla Component com_trading Blind SQL Injection Vulnerability

A Blind SQL Injection vulnerability exists in the Joomla Component com_trading. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'id' in the 'showsharedetails' task. An example of the exploit is 'http://127.0.0.1/index.php?option=com_trading&task=showsharedetails&id=1+AND+1=0+UNION+SELECT+1,2,3,4,5,6,7,8,9,10--'

Joomla Component com_tour SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'cid' in the URL. The attacker can use the UNION operator to append the results of a query to the existing query and extract data from the database. For example, an attacker can send the following request to the vulnerable parameter 'cid': -999+UNION+ALL+SELECT+1,2,3,4--

Faweb_2 Mullti Vulnerability

Faweb_2 is vulnerable to multiple vulnerabilities, including an upload vulnerability and a bypass vulnerability. The upload vulnerability allows an attacker to upload malicious files to the server, while the bypass vulnerability allows an attacker to bypass authentication and gain access to the admin panel. Both vulnerabilities can be exploited by sending a specially crafted HTTP request to the server.

Recent Exploits: