header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_ganalytics Local File Inclusion

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'controller' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary PHP code on the target system. Successful exploitation of this vulnerability requires that 'Register Globals' is enabled.

Joomla Component com_janews Local File Inclusion

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can use the ‘controller’ parameter to inject malicious code into the vulnerable server. For example, an attacker can send a request like www.site.com/index.php?option=com_janews&controller=../../../../../../../../../../etc/passwd%00 to read the /etc/passwd file.

Joomla Component com_linkr Local File Inclusion

A vulnerability in Joomla Component com_linkr allows an attacker to include local files on the server by manipulating the 'controller' parameter in the URL. An attacker can use this vulnerability to gain access to sensitive information such as the server's /etc/passwd file.

osDate Remote File Inclusion Vulnerabilities

An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This request contains a malicious file that can be included and executed on the server. The malicious file can be hosted on the attacker's server or any other server that allows remote file inclusion.

Joomla com_org SQL Injection Vulnerability (letter parameter)

This vulnerability allows an attacker to inject arbitrary SQL commands into the query by exploiting the 'letter' parameter in the 'com_org' component of Joomla. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable application. This can be done by appending the malicious SQL commands to the 'letter' parameter in the HTTP request.

Liquid XML Studio 2010 <= v8.061970 - (LtXmlComHelp8.dll) OpenFile() Remote 0day Heap Overflow Exploit

A heap overflow vulnerability exists in Liquid XML Studio 2010 <= v8.061970, which is caused by a boundary error when handling a specially crafted OpenFile() request. This can be exploited to cause a stack-based buffer overflow by e.g. enticing a user to open a specially crafted file. Successful exploitation may allow execution of arbitrary code.

Torrent Hoster Remont Upload Exploit

An attacker can exploit a vulnerability in Torrent Hoster Remont to upload malicious files. The vulnerability exists in the 'upload.php' file, which allows an attacker to upload a malicious file without any authentication. The malicious file can be uploaded by using the 'upfile' parameter in the 'upload.php' file. The malicious file can then be accessed by visiting the 'torrents' directory. Additionally, an attacker can also exploit an XSS vulnerability in the 'forgot_password.php' file to execute malicious JavaScript code.

Recent Exploits: