header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection in com_morfeoshow component for Joomla!

The 'com_morfeoshow' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

LEADTOOLS Imaging LEADSmtp ActiveX control insecure method vulnerability

The LEADTOOLS Imaging LEADSmtp ActiveX control is prone to a vulnerability caused by an insecure method. Successfully exploiting this issue will allow attackers to create or overwrite files within the context of the affected application (typically Internet Explorer) that uses the ActiveX control. Attackers may execute arbitrary code with user-level privileges.

Xoops All Version -Articles- Print.PHP (ID) Blind SQL Injection Exploit And PoC

Blind SQL Injection exploit and proof of concept for Xoops All Version -Articles- Print.PHP (ID). The exploit allows an attacker to execute arbitrary SQL queries by injecting malicious code into the 'id' parameter of the print.php page. The proof of concept URL demonstrates the exploitation of the vulnerability by injecting a UNION SELECT statement. The exploit is coded in Perl and uses IO::Socket module to send HTTP requests to the target server.

Remote Code Execution via Unauthorised File upload in Cforms 14.7

This exploit allows an attacker to upload files without authorization and execute remote code on the target system. The vulnerability exists in Cforms version 14.7 and has a CVE ID of 2014-9473. By exploiting this vulnerability, an attacker can upload malicious files and execute arbitrary code on the target system.

ecommercemajor ecommerce CMS SQL Injection and Authentication bypass

ecommercemajor is a php based CMS for ecommerce portal. It is vulnerable to SQL injection in the 'product.php' file where the 'productbycat' parameter is not properly filtered before being used in a SQL query. It is also vulnerable to authentication bypass in the 'index.php' file under the '__admin' directory, where the 'username' and 'password' parameters are not properly filtered before being used in a SQL query.

Sitemagic CMS Directory Traversal Vulnerability

The Sitemagic CMS is prone to a directory-traversal vulnerability that allows an attacker to obtain arbitrary local files by supplying a specially crafted input in the 'SMTpl' parameter of the 'index.php' script. By including '../' sequences in the parameter value, an attacker can traverse the directory structure and access files outside the intended directory.

Cross-Site Scripting Vulnerability in FanUpdate

The FanUpdate application fails to properly sanitize user-supplied input before using it in dynamically generated content. This allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. By exploiting this vulnerability, an attacker can steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: