header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_include SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'ID_NLE' of the 'com_include' component. An example of a malicious query is '-1 UNION SELECT concat(username,0x3a,password) FROM jos_users' which can be sent to the vulnerable parameter as 'http://127.0.0.1/index.php?option=com_include&lang=en_GB&Itemid=50&ID_NLE=-1 UNION SELECT concat(username,0x3a,password) FROM jos_users'

chilly_CMS CSRF Vulnerability

A script was created to delete the admin user through Cross Site Request Forgery (CSRF). An image tag was used to send a request to the server with the action parameter set to deleteuser and the id parameter set to the user ID. After execution, the page was refreshed and the added content was deleted automatically.

Arbitrary File Download in OSSIM

OSSIM is prone to a Arbitrary File Download vulnerability because the software fails to adequately sanitize user-supplied input. The file “download.php” in “/ossiminstall/repository/” directory suffers from an Arbitrary File Download vulnerability due to the missed input validation on the "file" parameter; in particular no validation is done on path traversal patterns.

phpscripte24 Auktionshaus Community Standart System Blind SQL Injection

A vulnerability in the phpscripte24 Auktionshaus Community Standart System allows an attacker to inject malicious SQL code into the http://server/auktion/auktion.php?id_auk=1+and+1=1+and+ascii (substring((SELECT password FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1 parameter, which can be used to extract sensitive information from the database.

Online Community CMS by I-net SQL Injection Vulnerability

A SQL injection vulnerability exists in Online Community CMS by I-net, which allows an attacker to execute arbitrary SQL commands via the 'blid', 'plid', 'vdoid', and 'mid' parameters in view-blog-full.php, mem-play-song-cnt.php, mem_videos-play-cnt.php, and profile.php respectively.

Joomla Component com_rwcards Local File Inclusion [LFI]

A vulnerability in the Joomla Component com_rwcards allows an attacker to perform a Local File Inclusion (LFI) attack. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'controller' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with maliciously crafted 'controller' parameter. This can allow an attacker to read arbitrary files on the vulnerable system.

Recent Exploits: