header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla (jVideoDirect) BLIND SQL Injection Vulnerability

Input var v is vulnerable to SQL Code Injection. A proof of concept is provided which involves sending two requests to the server, one with a substring of the version set to 5 and one with a substring of the version set to 4. If the response time is high, the version substring is 5, and if the response time is low, the version substring is 4.

Joomla (com_kunena) BLIND SQL Injection Vulnerability

Input var do is vulnerable to SQL Code Injection. It allows an attacker to execute arbitrary SQL queries. The vulnerability is confirmed in Joomla version 1.5.9 but probably other versions are also affected. The proof of concept involves sending a malicious SQL query to the vulnerable parameter do. The response time of the server can be used to determine if the query was successful or not.

NovaBoard v1.1.2 SQL Injection Vulnerability

An attacker can exploit a SQL injection vulnerability in NovaBoard v1.1.2 to gain access to sensitive information such as usernames, passwords, and emails. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'page' and 'forums' parameters of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.

Joomla (com_ccnewsletter) Directory Traversal Vulnerability

Input var controller is vulnerable to Directory Traversal Vuln. A proof of concept is provided which involves accessing the http://server/[JOOMLA_PATH]/index.php?option=com_ccnewsletter&view=ccnewsletter&Itemid=87&controller=[-DT-] URL with [-DT-] replaced by ;) to exploit the vulnerability.

Apple Iphone/Ipod – Serversman 3.1.5 HTTP Remote DoS exploit

This exploit is used to cause a denial of service (DoS) on Apple Iphone/Ipod devices running the Serversman 3.1.5 application. The exploit sends a malicious HTTP request to the target device, which causes the device to crash and become unresponsive.

CamShot SEH overwrite by tecnik

CamShot SEH overwrite is a vulnerability in CamShot which allows an attacker to overwrite the Structured Exception Handler (SEH) of the application. This vulnerability is caused by a buffer overflow in the application which allows an attacker to inject malicious code into the application. The malicious code can then be executed by the application, allowing the attacker to gain control of the application.

Joomla (com_virtuemart) SQL Injection Vulnerability

Input var order_status_id is vulnerable to SQL Code Injection. A proof of concept is provided which shows that the vulnerable parameter can be used to execute arbitrary SQL queries. The vulnerability has been confirmed in Joomla 1.1.4 stable, but other versions may also be affected.

Joomla Module (Customers_who_bought…) SQL Injection Vulnerability

Test done against Customers_who_bought (VirtueMart Module) and sh404SEF Joomla component. Both Commercial Joomla extensions, so my researching is poor. Injection is done in url redirection (View SQL errors) and result can be visible in source code, url, error page,... Since sh404SEF is used I cann't detect affected vars, but also there are BSQLi. Trying to search the module/component vulnerable, i've tested sh404SEF and VirtueMart. But Vulnerability cann't reproduce. Probably issue is in Customers_who_bought Module (hence advisory title).

Recent Exploits: