Search

Advanced Search

Search Only:



Total: 41 results found.
Search Keyword exploit
Page 1 of 3
«StartPrev123NextEnd»
1.
(Comments/All)
thanks you i exploit successful ...
2.
(Comments/All)
... code would be developing exploits, and that would buy a significant number of sites a few more hours time. So what Tijn might have been better off saying is "your timing is less than optimal". "Jerk" ...
3.
(Comments/All)
... intent in a private manner? Or maybe you're mad I disclosed something you were actively exploiting sites with yourself? Whatever. Thanks for the comment, asshole... ...
4.
(Code/Joomla!)
Joomla! 1.6.x/1.7.x/2.5.0-2.5.2 suffers from a privilege escalation vulnerability that allows users to be registered into any group not having 'core.admin' privileges. In order to be exploited, an ...
5.
(Code/Joomla!)
... lead to exploitation. Versions 1.5 through 1.7.1 are affected. Sites running unpatched versions of PHP already vulnerable to the "SplObjectStorage Deserialization Use-After-Free Vulnerability" ...
6.
(Code/Joomla!)
... Exploit Title: Joomla! 1.5/1.6 TinyMCE Disk Space DOS # Date: 25 February 2010 # Author: Jeff Channell # Software Link: http://www.joomla.org # header clear echo "###################################################" echo ...
7.
(Comments/All)
One more thing--in actual use I've never seen jFirewall Lite do anything. It doesn't even log anything. jHackguard has only picked off some spam. Both seem to miss exploit attempts that show up my logs. ...
8.
(Comments/All)
... and often any sensible, simple, new version release notices is a major drawback for the way it adds risk and maintenance costs to Joomla sites. On th jXtended Comments exploit, why hasn't this been openly ...
9.
(Code/Joomla!)
Moset's Tree <= 2.1.6 for Joomla! does not use anti-CSRF tokens in its admin forms. Successful exploitation of this exploit requires the admin to be logged in & visit a malicious URL. <?php /**  ...
10.
(Code/Joomla!)
The guys over at YGN posted a video today of a 0-day Joomla! 1.5.20 XSS flaw. I've taken a look and have a quick fix that should prevent exploitation. The flaw is in libraries/joomla/document/html/html.php, ...
11.
(Code/Joomla!)
... PHP] Successful exploitation of this exploit requires a site administrator to visit a malicious URL while logged in to the backend. The location of the overwritten file in this case is components/com_sobi2/templates/default/sobi2.details.tmpl.php ...
12.
(Code/Joomla!)
There is a file upload vulnerability in version 1.8.8 and earlier of JomSocial, the popular community extension for Joomla!. Successful exploitation of this exploit requires the site to be configured ...
13.
(Comments/All)
I disagree. The exploit is entered on the frontend comment form, using only the credentials necessary to post a comment - hardly a "trusted" position. The fact that you have to be admin to trigger the ...
14.
(Code/Joomla!)
Mosets Tree suffers from a shell upload vulnerabilty caused by improperly checking the filetype of uploaded images. Tools used: Firefox web browser Firebug extension GIMP image editor Steps ...
15.
(Code/Joomla!)
K2 v2.3, the popular Joomla! CCK extension, suffers from persistent XSS vulnerabilities in its comment facility. Comment "Name" Field Persistent XSS " style="position:absolute;top:0px;left:0px;width:99em;height:99em" ...
16.
(Code/Joomla!)
... is, I'll post the dirty details of the exploit I used to hack extensions.joomla.org! Also, please note that I was given permission to do so and nothing of any value was harmed! UPDATE: ...
17.
(Code/Joomla!)
Since the CompojoomComment Hacking Contest is now over, and I was the only winner, I figured I'd go ahead and share my winning entries. These vulnerabilities are present in CompojoomComment 4.1.5, and ...
18.
(Code/Joomla!)
Compojoom, developers of CompojoomComment, opened up a contest to hack their comment component. After being alerted to the contest by my good friend Lafrance, I took a peek and had a working XSS exploit ...
19.
(Code/Joomla!)
... matters into my own hands and patch this. And, in the spirit of open source, I thought I'd share the fix with everyone. The exploit in question uses the URL parameter "author" to inject SQL commands, ...
20.
(Code/Joomla!)
... interaction, displays indications of malware, but still technically exploitable. [url]http://google.com?[url] onmousemove=javascript:alert(String.fromCharCode(88,83,83));//[/url][/url] CSRF: [img] ...
Page 1 of 3
«StartPrev123NextEnd»

The Joomla!® name is used under a limited license from Open Source Matters in the United States and other countries. Jeff Channell is not affiliated with or endorsed by Open Source Matters or the Joomla!® Project.

Santorum
Joomla Extensions