header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_juliaportfolio Local File Inclusion

A Local File Inclusion (LFI) vulnerability exists in Joomla Component com_juliaportfolio. An attacker can exploit this vulnerability to include local files on the server. The vulnerable parameter is ‘controller’ which can be exploited by using ‘../’ to traverse to the parent directory. An attacker can use this vulnerability to include local files on the server such as /etc/passwd and /proc/self/environ.

Media Player classic StatsReader (.stats file) stack buffer Overflow poc

A stack buffer overflow vulnerability exists in Media Player classic StatsReader (.stats file) which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to insufficient boundary checks when processing a specially crafted .stats file. An attacker can exploit this vulnerability by enticing a user to open a malicious .stats file.

FreeBSD and OpenBSD ‘ftpd’ NULL Pointer Dereference Denial Of Service Vulnerability

The FreeBSD and OpenBSD 'ftpd' service is prone to a denial-of-service vulnerability because of a NULL-pointer dereference. Successful exploits may allow remote attackers to cause denial-of-service conditions. Given the nature of this issue, attackers may also be able to run arbitrary code, but this has not been confirmed.

dreamlive Auktionshaus script news.php (id) SQL Injection

A vulnerability in the dreamlive Auktionshaus script news.php allows an attacker to inject arbitrary SQL commands via the 'id' parameter. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious SQL commands to the vulnerable script. This can be done by appending a 'union select' statement to the 'id' parameter, which allows the attacker to extract data from the database.

Invision Power Board Currency Mod(edit) SQL injection

Invision Power Board Currency Mod(edit) SQL injection is a vulnerability that allows an attacker to update their user to an admin account by exploiting a SQL injection vulnerability in the Invision Power Board Currency Mod(edit). The exploit is done by sending a POST request with the user's ID and password hash to the server, which then updates the user's account to an admin account.

Joomla Component com_family SQL Injection Vulnerability

An SQL injection vulnerability exists in the Joomla Component com_family. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

Joomla Component com_leader SQL Injection Vulnerability

The vulnerability exists in the 'com_leader' component of Joomla. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'id' in the 'view' task of the component. An example of the malicious query is '-1 UNION SELECT 1,2,3,4,5,6,7,8,9,10,11 FROM jos_users'. This query will allow the attacker to extract data from the database.

Joomla Component com_start SQL Injection Vulnerability

An SQL injection vulnerability exists in the Joomla Component com_start. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'mitID' in the URL. An example of this exploit is http://127.0.0.1/index.php?option=com_start&task=main&mitID=-1/**/UNION/**/SELECT/**/1,concat(username,0x3a,password),3,4/**/FROM/**/jos_users/*

Recent Exploits: