AtT4CKxT3rR0r1ST

99 exploits Active since Jul 2007
EIP-2026-109815 EXPLOITDB html WORKING POC
N-13 News 4.0 - Cross-Site Request Forgery (Add Admin)
EIP-2026-109791 EXPLOITDB text WORKING POC
MySms 1.0 - Multiple Vulnerabilities
EIP-2026-109756 EXPLOITDB text WRITEUP
myBusinessAdmin - 'content.php' Blind SQL Injection
EIP-2026-109533 EXPLOITDB text WORKING POC
MobPartner Chat - Multiple SQL Injections
EIP-2026-109818 EXPLOITDB text WORKING POC
Nabernet - 'articles.php' SQL Injection
EIP-2026-109455 EXPLOITDB text WORKING POC
Middle School Homework Page 1.3 Beta 1 - Multiple Vulnerabilities
EIP-2026-108468 EXPLOITDB text WORKING POC
Joomla! Component com_otzivi - Local File Inclusion
EIP-2026-108431 EXPLOITDB text WORKING POC
Joomla! Component com_linkr - Local File Inclusion
CVE-2010-1219 EXPLOITDB text WORKING POC
JA News (com_janews) 1.0 - Path Traversal
Directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
EIP-2026-108358 EXPLOITDB text WORKING POC
Joomla! Component com_ganalytics - Local File Inclusion
EIP-2026-108305 EXPLOITDB text WORKING POC
Joomla! Component com_clan - SQL Injection
EIP-2026-108251 EXPLOITDB text WORKING POC
Joomla! Component com_acstartseite - SQL Injection
EIP-2026-108250 EXPLOITDB text WORKING POC
Joomla! Component com_acprojects - SQL Injection
CVE-2010-0467 EXPLOITDB MEDIUM text WORKING POC
Chillcreations Com Ccnewsletter - Path Traversal
Directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php.
CVSS 5.8
EIP-2026-108256 EXPLOITDB text WORKING POC
Joomla! Component com_adsmanager - Remote File Inclusion
CVE-2010-0632 EXPLOITDB text WORKING POC
Parkviewconsultants Com Simplefaq - SQL Injection
SQL injection vulnerability in the Parkview Consultants SimpleFAQ (com_simplefaq) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a display action to index.php.
EIP-2026-108530 EXPLOITDB text WORKING POC
Joomla! Component com_sectionex - Local File Inclusion
EIP-2026-108523 EXPLOITDB text WORKING POC
Joomla! Component com_s5clanroster - 'id' SQL Injection
CVE-2010-1056 EXPLOITDB text WORKING POC
Joomla! <1.0.1 - Path Traversal
Directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
EIP-2026-108486 EXPLOITDB text WORKING POC
Joomla! Component com_ponygallery - Remote File Inclusion
EIP-2026-108104 EXPLOITDB text WORKING POC
Job Site 1.0 - Multiple Vulnerabilities
EIP-2026-107948 EXPLOITDB text WORKING POC
IPN Development Handler 2.0 - Multiple Vulnerabilities
EIP-2026-107898 EXPLOITDB text WORKING POC
intuitive - 'form.php' SQL Injection
EIP-2026-107688 EXPLOITDB text WORKING POC
Hyena Cart - 'index.php' SQL Injection
EIP-2026-107557 EXPLOITDB text WORKING POC
HASHE! Solutions - Multiple SQL Injections