header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_cartweberp

The vulnerability exists in the Joomla component com_cartweberp. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains malicious input to the 'controller' parameter which is not properly sanitized before being used to include files. This can allow an attacker to include arbitrary files from the local system and execute arbitrary code on the vulnerable server.

com_aprice Blind SQL Injection Exploit

com_aprice Blind SQL Injection Exploit is a vulnerability in the com_aprice component of Joomla! CMS. It allows an attacker to inject malicious SQL queries into the application, which can be used to extract sensitive information from the database. The exploit is based on the fact that the application does not properly validate user input, allowing an attacker to craft malicious SQL queries that can be used to extract data from the database.

PlayMeNow Malformed M3U Playlist BOF WinXP SP2 Fr

A buffer overflow vulnerability exists in PlayMeNow 7.4.0.0, which could allow a remote attacker to execute arbitrary code on the system. An attacker could send a specially crafted M3U playlist file to the vulnerable application, which could cause a buffer overflow and allow the attacker to execute arbitrary code on the system.

WordPress script <== x.x.x (Events Plugins)SQL Injection Vulnerability

A SQL injection vulnerability exists in the Events Plugins of Wordpress Script All Versions. An attacker can send a maliciously crafted request to the vulnerable script and execute arbitrary SQL commands in the back-end database, allowing for data theft and manipulation.

Joomla Component com_dailymeals

A vulnerability in the Joomla component com_dailymeals allows an attacker to perform a Local File Inclusion (LFI) attack. This vulnerability is caused by insufficient sanitization of user-supplied input in the 'controller' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable server. This will allow the attacker to include and execute arbitrary local files on the server.

AL-Athkat.v2.0 Cross Site Scripting Vulnerability

A Cross-Site Scripting (XSS) vulnerability was discovered in AL-Athkat.v2.0. An attacker can exploit this vulnerability to inject malicious JavaScript code into the vulnerable application. This code will be executed in the browser of the victim when the vulnerable page is accessed. The malicious code can access any cookies, session tokens, or other sensitive information retained by the browser and used with the vulnerable application. This may lead to the attacker taking control of the affected user's session.

Recent Exploits: