Search

Advanced Search

Search Only:



Total: 46 results found.
Search Keyword php
Page 1 of 3
«StartPrev123NextEnd»
1.
(Shop/Joomla Components)
JMyLife is a Joomla component that replicates the functionality of http://fmylife.com
2.
(Code/Joomla!)
... site]/index.php?option=com_finder&highlight=WyJcXCIsIl0pO2FsZXJ0KDEpO1wvXC9cXCJd Decoded payload: ["\\","]);alert(1);\/\/\\"] How it works: the highlight plugin decodes the payload from base64 then ...
3.
(Comments/All)
I am trying in my websites (1.7.1 & 2.5.1) and the user thath create is Registered, no Admin. I am follow those steps: 1. go to mydomain + index.php?option=com_users&view=registration 2. The ...
4.
(Code/Joomla!)
... attacker must visit index.php?option=com_users&view=registration and start creating a new user. During the initial creation, the attacker must cause the registration to fail by either NOT using the same ...
5.
(Code/Joomla!)
... lead to exploitation. Versions 1.5 through 1.7.1 are affected. Sites running unpatched versions of PHP already vulnerable to the "SplObjectStorage Deserialization Use-After-Free Vulnerability" ...
6.
(Code/Joomla!)
... (compatible; MSIE 7.0; Windows NT 5.1)" MCEDOS_ROOT_PATH="http://$MCEDOS_JOOMLAHOST/$MCEDOS_PART/editors/tinymce/jscripts/tiny_mce/tiny_mce_gzip.php?js=true&diskcache=true&compress=false&plugins=" echo ...
7.
(Code/Joomla!)
... in as any user Edit profile Change name: y"/style="position:absolute;top:0px;left:0px;width:99em;height:99em"/onmouseover="alert(1);// Save profile Wait for admin to visit administrator/index.php?option=com_users ...
8.
(Code/Joomla!)
... src="<img src=x"/onerror=alert(1)//"> > > Here's a quick way to reproduce: append the following somewhere in the > template: > > <?php > $test = ...
9.
(Comments/All)
Since mod_custom doesn't allow for PHP code execution, I'd say you'd have to use something else. ...
10.
(Code/Joomla!)
Moset's Tree <= 2.1.6 for Joomla! does not use anti-CSRF tokens in its admin forms. Successful exploitation of this exploit requires the admin to be logged in & visit a malicious URL. <?php /**  ...
11.
(Code/Joomla!)
The guys over at YGN posted a video today of a 0-day Joomla! 1.5.20 XSS flaw. I've taken a look and have a quick fix that should prevent exploitation. The flaw is in libraries/joomla/document/html/html.php, ...
12.
(Code/Joomla!)
SOBI2's admin panel doesn't explicitly check for _POST requests, nor does it have a nonce. http://[victim]/administrator/index.php?stpl=default&returnTask=editTemplate&task=saveConfig&option=com_sobi2&editing=config&templateContent=[URL-Encoded ...
13.
(Comments/All)
... exploit makes it more dangerous than usual - executing arbitrary code as admin means I can load up a hidden iframe, install my own php code, etc. ...
14.
(Code/Joomla!)
... to Reproduce: Open GIMP, create a new image. Save image as a GIF file, with the shell as the comment (surrounded by tags). Rename GIF to shell.gif.php Create an account on the target site Navigate ...
15.
(Code/Joomla!)
Over the Labor Day weekend I managed to upload and execute arbitrary PHP code on the Joomla! Extensions Directory. That site has been patched, but the patch is not yet publicly available. As soon as it ...
16.
(Code/Joomla!)
... for possible inclusion in the JomSocial core. Adding LinkedTube consists of two easy steps. First, create the file components/com_community/libraries/videos/linkedtube.php and add the following code: ...
17.
(Other/Other)
... site will no longer be based on Joomla! and will instead be running in CakePHP. The decision to do this came as a hard one, because I do so love the Joomla! framework, but I finally came to the conclusion ...
18.
(Comments/All)
... ); } } closedir($dh); } // http://www.php.net/manual/en/function.unlink.php#94766 function recursiveDelete( $str ) { if( is_file( $str ) ) { return @unlink( $str ); } elseif( is_dir( ...
19.
(Code/Joomla!)
... ensuring the component was up to date, and double checking the .htaccess, I reasoned that it must be a bug in the router.php. After slogging through the code, I managed to find a fix. The configuration ...
20.
(Code/Joomla!)
... jdoc:include tags outside the template itself. In order to load a module position using PHP, use the following snippet: <?php require_once(JPATH_ROOT.DS.'libraries'.DS.'joomla'.DS.'application'.DS.'module'.DS.'helper.php'); $document ...
Page 1 of 3
«StartPrev123NextEnd»

The Joomla!® name is used under a limited license from Open Source Matters in the United States and other countries. Jeff Channell is not affiliated with or endorsed by Open Source Matters or the Joomla!® Project.

Santorum
Joomla Extensions