header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! Component Collection Factory 4.1.9 – SQL Injection

Joomla! Component Collection Factory 4.1.9 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This request contains malicious SQL code that can be executed in the backend database, allowing the attacker to access sensitive information or modify the data stored in the database.

Joomla! Component Swap Factory 2.2.1 – SQL Injection

Joomla! Component Swap Factory 2.2.1 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.

Joomla Component eXtroForms 2.1.5 – ‘filter_type_id’ SQL Injection

An attacker can execute SQL commands through parameters that contain vulnerable. An authorized user can use the filtering feature and can fully authorize the database or other server informations. 'filter_type_id, filter_pid_id, filter_search' parameters have the same vulnerable.

Joomla! Component Social Factory 3.8.3 – SQL Injection

Joomla! Component Social Factory 3.8.3 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This request contains malicious SQL code that can be executed in the backend database, allowing the attacker to gain access to sensitive information or modify the data stored in the database.

Joomla! Component Jobs Factory 2.0.4 – SQL Injection

Joomla! Component Jobs Factory 2.0.4 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'filter_letter' in the 'index.php' file. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

Joomla! Component Questions 1.4.3 – SQL Injection

Joomla! Component Questions 1.4.3 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by sending a specially crafted HTTP request to the vulnerable application. The attacker can use the vulnerable parameters to inject malicious SQL queries. This can be used to extract sensitive information from the database or to modify the database content.

Easy PhoroResQ 1.0 – Buffer Overflow (PoC)

A buffer overflow vulnerability exists in Easy PhoroResQ 1.0, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the application when handling user-supplied input. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted string passed to the 'Folder/filename' field. Successful exploitation may allow execution of arbitrary code.

Joomla! Component Penny Auction Factory 2.0.4 – SQL Injection

A SQL injection vulnerability exists in Joomla! Component Penny Auction Factory 2.0.4. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in application's database. This can be exploited to manipulate or disclose arbitrary data from the database.

Joomla! Component Music Collection 3.0.3 – SQL Injection

Joomla! Component Music Collection 3.0.3 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This request contains malicious SQL statements that are executed in the backend database. This can allow an attacker to gain unauthorized access to sensitive data stored in the database.

Joomla! Component Raffle Factory 3.5.2 – SQL Injection

Joomla! Component Raffle Factory 3.5.2 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

Recent Exploits: