Joomla! Component GMapFP 3.5 – Unauthenticated Arbitrary File Upload
December 1st, 2020 📆 | 2735 Views ⚑
# Exploit Title: Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload # Google Dork: inurl:''com_gmapfp'' # Date: 2020-03-27 #
December 1st, 2020 📆 | 2735 Views ⚑
# Exploit Title: Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload # Google Dork: inurl:''com_gmapfp'' # Date: 2020-03-27 #
November 4th, 2020 📆 | 4629 Views ⚑
# Exploit Title: Joomla JomSocial 4.7.6 Stored XSS# Date: 03.11.2020# Author: Vincent666 ibn Winnie# Software Link: https://www.jomsocial.com/demo# Tested on: Windows
November 4th, 2020 📆 | 7810 Views ⚑
# Exploit Title: Joomla Publisher V 3.0.19 Stored XSS# Date: 03.11.2020# Author: Vincent666 ibn Winnie# Software Link: https://publisher.ijoomla.com/demo# Tested on:
September 16th, 2020 📆 | 4089 Views ⚑
# Exploit Title: Joomla! paGO Commerce 2.5.9.0 - SQL Injection (Authenticated) # Date: 2020-08-21 # Exploit Author: Mehmet Kelepçe /
September 15th, 2020 📆 | 3784 Views ⚑
# Exploit Title: Joomla! paGO Commerce 2.5.9.0 – SQL Injection (Authenticated)# Date: 2020-08-21# Exploit Author: Mehmet Kelepçe / Gais Cyber
September 8th, 2020 📆 | 1995 Views ⚑
# Exploit Title: Joomla! Component GMapFP J3.5/J3.5F – Unauthenticated Arbitrary File Upload# Google Dork: inurl:”com_gmapfp”# Date: 2020-03-27# Exploit Author: ThelastVvV#
August 22nd, 2020 📆 | 5304 Views ⚑
# Exploit Title: Joomla! Adagency V 6.1.2 Cross Site Scripting# Date: 24.07.2020# Author: Vincent666 ibn Winnie# Software Link: https://adagency.ijoomla.com/# Tested
July 9th, 2020 📆 | 2517 Views ⚑
# Exploit Title: Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection # Date: 2020-06-17 # Exploit Author: Mehmet Kelepçe
July 2nd, 2020 📆 | 2384 Views ⚑
#Exploit Title: Joomla J2 JOBS – Authenticated SQL Injection#Date: 17.06.2020#Exploit Author: Mehmet Kelepçe / Gais Cyber Security#Vendor Homepage: https://joomsky.com/#Software Link:
June 11th, 2020 📆 | 5068 Views ⚑
Image: Joomla team The team behind the Joomla open source content management system (CMS) announced a security breach last week.
June 10th, 2020 📆 | 2678 Views ⚑
#Exploit Title: Joomla J2 Store v3.3.11 – Authenticated SQL Injection#Date: 17.04.2020#Exploit Author: Mehmet Kelepçe / Gais Cyber Security#Vendor Homepage: https://www.j2store.org/#Software
June 9th, 2020 📆 | 6123 Views ⚑
Over its 24-year history JavaScript has become a multi-purpose language and has accreted a complex ecosystem of frameworks, libraries and
May 28th, 2020 📆 | 6855 Views ⚑
# Exploit Title: Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated) # Date: 2020-05-10 # Exploit Author: Mehmet
May 27th, 2020 📆 | 3265 Views ⚑
#Exploit Title: Joomla XCloner Backup – Authenticated Local File Disclosure#Date: 10.05.2020#Exploit Author: Mehmet Kelepçe / Gais Cyber Security#Exploit-Db Author ID:
May 19th, 2020 📆 | 8380 Views ⚑
As usual, I had a client with a very specific request for their Joomla website: they had some forms on
March 31st, 2020 📆 | 4333 Views ⚑
# Exploit Title: Joomla! com_fabrik 3.9.11 - Directory Traversal #Google Dork: inurl:"index.php?option=com_fabrik" #Date: 2020-03-30 #Exploit Author: qw3rTyTy #Vendor Homepage: https://fabrikar.com/
March 30th, 2020 📆 | 3885 Views ⚑
# Exploit Title: Joomla! com_fabrik 3.9.11 – Directory Traversal#Google Dork: inurl:”index.php?option=com_fabrik”#Date: 2020-03-30#Exploit Author: qw3rTyTy#Vendor Homepage: https://fabrikar.com/#Software Link: https://fabrikar.com/downloads#Version: 3.9#Tested on:
March 25th, 2020 📆 | 6413 Views ⚑
# Exploit Title: Joomla! Component GMapFP 3.30 – Arbitrary File Upload# Google Dork: inurl:”com_gmapfp”# Date: 2020-03-25# Exploit Author: ThelastVvV# Vendor
March 25th, 2020 📆 | 1684 Views ⚑
# Exploit Title: Joomla! Component GMapFP 3.30 - Arbitrary File Upload # Google Dork: inurl:''com_gmapfp'' # Date: 2020-03-25 # Exploit
March 24th, 2020 📆 | 3733 Views ⚑
# Exploit Title: Joomla! com_hdwplayer 4.2 – ‘search.php’ SQL Injection# Dork: inurl:”index.php?option=com_hdwplayer”# Date: 2020-03-23# Exploit Author: qw3rTyTy# Vendor Homepage: https://www.hdwplayer.com/#
Comments