header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_jvideodirect

A directory traversal vulnerability exists in Joomla Component com_jvideodirect. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains a maliciously crafted URL with a directory traversal payload, which allows the attacker to access sensitive files on the server, such as the /etc/passwd file.

Joomla Component com_jcollection

This vulnerability allows an attacker to read sensitive files on the server by exploiting a directory traversal vulnerability in the Joomla component com_jcollection. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'controller' parameter of the 'index.php' script. A remote attacker can send a specially crafted HTTP request containing directory traversal sequences (e.g. '../../../../../../etc/passwd%00') and read arbitrary files from the server.

ZeEwAyS ScRiPt SQL Injection Vulnerability

A SQL injection vulnerability exists in ZeEwAyS ScRiPt, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter in the 'product_desc.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can result in the disclosure of sensitive information such as usernames and passwords.

Joomla Component com_dashboard

A directory traversal vulnerability exists in Joomla Component com_dashboard, which allows an attacker to read arbitrary files on the server. This vulnerability is due to insufficient sanitization of user-supplied input to the 'controller' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g., '../') to the vulnerable script. This may allow the attacker to read arbitrary files on the server.

@lex Guestbook Multi Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'seeMess' parameter to '/index.php' script. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable website. Also, the setup.php script is accessible without authentication, which can be used to gain administrative access.

Real Player Local Crash Poc

This exploit is a buffer overflow vulnerability in Real Player version 12.0.0.343. The exploit is triggered by sending a maliciously crafted URL to the application, which causes the application to crash. The URL contains a string of 8000000 'A' characters, which causes the application to crash when it attempts to process the URL.

Remote Sql Injection in phpMDJ 1.0.3

phpMDJ 1.0.3 is vulnerable to a Remote Sql Injection vulnerability due to improper sanitization of user input in the 'id' parameter of the 'profile.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable script. An example of such a request is http://site/path/profile.php?id=-1 union select 1,2,3,mdp,5,6,pseudo,8,9,10,11,12,13,14,15,16 FROM phpmdj_users where id=1--

ProArcadeScript to Game (game) SQL Injection Vulnerability

An attacker can inject malicious SQL queries into the vulnerable parameter 'id' of the 'game.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. An example of a malicious URL is http://server/games/game.php?id=-999+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19--

Recent Exploits: