header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MasterWeb Script <== 1.0 (details&newsID) SQL Injection Vulnerability

An attacker can exploit a SQL injection vulnerability in MasterWeb Script 1.0 by sending malicious SQL queries to the application. This can allow the attacker to gain access to sensitive information stored in the database, such as user credentials, or even modify the database.

Joomla Component com_hotbrackets Blind SQL injection Vulnerability

A Blind SQL injection vulnerability exists in the Joomla Component com_hotbrackets, which allows an attacker to gain admin login credentials. The vulnerability is triggered when maliciously crafted input is passed via the 'id' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. A successful exploit could allow the attacker to gain admin login credentials.

Joomla Component com_alfresco SQL Injection Vulnerability

An SQL injection vulnerability exists in the Joomla component com_alfresco. An attacker can exploit this vulnerability to gain access to the admin login credentials. This can be done by sending a maliciously crafted HTTP request to the vulnerable server. The vulnerable parameter is 'id_pan' which can be manipulated to inject malicious SQL code.

Joomla Component com_tpjobs Blind SQL injection Vulnerability

com_tpjobs is vulnerable to Blind SQL injection. An attacker can exploit this vulnerability to gain access to admin login credentials. The vulnerable parameter is ‘id_c[]’. The attacker can inject malicious SQL queries in the parameter and gain access to the admin credentials. The malicious query should be filtered to prevent exploitation.

Joomla Component com_abbrev Local File Inclusion Vulnerability

A vulnerability exists in the Joomla component com_abbrev, which allows an attacker to include local files on the server. This can be exploited by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../../../../../../../../../etc/passwd%00') to the vulnerable server. Successful exploitation of this vulnerability can lead to the disclosure of sensitive information, such as the contents of the /etc/passwd file.

Joomla Component com_bfsurvey

A vulnerability exists in Joomla Component com_bfsurvey, which allows an attacker to include a local file via the 'controller' parameter in the URL. An attacker can exploit this vulnerability by crafting a malicious URL and sending it to the victim. The malicious URL can be used to include a local file, such as a malicious PHP script, which can be used to execute arbitrary code on the vulnerable system.

com_bfsurvey_pro (catid) Blind SQL Injection Exploit

This exploit is related to a blind SQL injection vulnerability in the com_bfsurvey_pro component of Joomla. The vulnerability is triggered when the 'catid' parameter is not properly sanitized before being used in an SQL query. This allows an attacker to inject arbitrary SQL code into the query, which can be used to extract sensitive information from the database.

Joomla Component com_biblestudy

A vulnerability exists in Joomla Component com_biblestudy, which allows an attacker to include a file from the local system. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This can be done by appending the 'view' parameter with a malicious file path, which can be used to include a file from the local system.

Recent Exploits: