snakespc

55 exploits Active since May 2007
EIP-2026-108521 EXPLOITDB text WORKING POC
Joomla! Component com_rsgallery2 2.0 - 'catid' SQL Injection
EIP-2026-108247 EXPLOITDB text WORKING POC
Joomla! Component com_about - SQL Injection
EIP-2026-108272 EXPLOITDB text WORKING POC
Joomla! Component com_avosbillets - SQL Injection
EIP-2026-108281 EXPLOITDB text WORKING POC
Joomla! Component com_biographies - SQL Injection
EIP-2026-108362 EXPLOITDB text WORKING POC
Joomla! Component com_gurujibook - SQL Injection
EIP-2026-108364 EXPLOITDB text WORKING POC
Joomla! Component com_hdvideoshare - SQL Injection
EIP-2026-108372 EXPLOITDB php WORKING POC
Joomla! Component com_ice - Blind SQL Injection
EIP-2026-108411 EXPLOITDB php WORKING POC
Joomla! Component com_Joomlaconnect_be - Blind Injection
EIP-2026-108414 EXPLOITDB text WORKING POC
Joomla! Component com_joomportfolio - Blind Injection
EIP-2026-108433 EXPLOITDB php WORKING POC
Joomla! Component com_liveticker - Blind SQL Injection
EIP-2026-108454 EXPLOITDB text WORKING POC
Joomla! Component com_news - SQL Injection
EIP-2026-108458 EXPLOITDB text WORKING POC
Joomla! Component com_nfnaddressbook - SQL Injection
EIP-2026-108473 EXPLOITDB php WORKING POC
Joomla! Component com_paxgallery - Blind Injection
CVE-2010-1045 EXPLOITDB text WORKING POC
Joomla! com_productbook 1.0.4 - SQL Injection
SQL injection vulnerability in the Productbook (com_productbook) component 1.0.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. NOTE: some of these details are obtained from third party information.
EIP-2026-108579 EXPLOITDB text WORKING POC
Joomla! Component com_videos - SQL Injection
CVE-2007-2792 EXPLOITDB text WORKING POC
YaNC <1.5 beta 3 - SQL Injection
SQL injection vulnerability in the Yet another Newsletter Component (aka YaNC or com_yanc) component before 1.5 beta 3 for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter to index.php. NOTE: some of these details are obtained from third party information.
EIP-2026-107377 EXPLOITDB text WORKING POC
Généré par KDPics 1.18 - Remote Add Admin
CVE-2009-2013 EXPLOITDB text WORKING POC
Frontis 3.9.01.24 - SQL Injection
SQL injection vulnerability in bin/aps_browse_sources.php in Frontis 3.9.01.24 allows remote attackers to execute arbitrary SQL commands via the source_class parameter in a browse_classes action.
CVE-2009-3314 EXPLOITDB text WORKING POC
Eliteladders Elite Gaming Ladders - SQL Injection
SQL injection vulnerability in ladders.php in Elite Gaming Ladders 3.2 allows remote attackers to execute arbitrary SQL commands via the platform parameter.
CVE-2009-4933 EXPLOITDB text WORKING POC
Winterwebs Ezwebitor - SQL Injection
Multiple SQL injection vulnerabilities in login.php in EZ Webitor allow remote attackers to execute arbitrary SQL commands via the (1) txtUserId (Username) and (2) txtPassword (Password) parameters. NOTE: some of these details are obtained from third party information.
CVE-2009-1506 EXPLOITDB text WORKING POC
Intelliants Elitius - SQL Injection
SQL injection vulnerability in classes/Xp.php in eLitius 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to banner-details.php.
EIP-2026-106333 EXPLOITDB text WORKING POC
daChooch - SQL Injection
CVE-2009-1741 EXPLOITDB text WORKING POC
Dutchmonkey DM Filemanager - SQL Injection
Multiple SQL injection vulnerabilities in login.php in DM FileManager 3.9.2, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) Username and (2) Password fields.
CVE-2008-5489 EXPLOITDB text WORKING POC
ClipShare Pro <2008 - SQL Injection
SQL injection vulnerability in channel_detail.php in ClipShare Pro 4, and 2006 through 2007, allows remote attackers to execute arbitrary SQL commands via the chid parameter.
CVE-2009-1548 EXPLOITDB text WORKING POC
Qsix Blusky Cms - SQL Injection
SQL injection vulnerability in index.php in BluSky CMS allows remote attackers to execute arbitrary SQL commands via the news_id parameter in a read action.