oppsec / juumla

🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and sensitive files
https://www.joomla.org
MIT License
164 stars 26 forks source link

wrong vulnerabilities in version #1

Closed d4op closed 3 years ago

d4op commented 3 years ago

output: [INF] Trying to get Joomla version on target... [INF] Joomla version is: 1.5.15

[INF] Searching for Joomla vulnerabilites for this version [INF] Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation [INF] Joomla! 3.7 - SQL Injection [INF] Joomla! 3.9.0 < 3.9.7 - CSV Injection [INF] Joomla! 3.9.13 - 'Host' Header Injection [INF] Joomla! < 3.6.4 - Admin Takeover [INF] Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution [INF] Joomla! 1.5 < 3.4.6 - Object Injection 'x-forwarded-for' Header Remote Code Execution [INF] Joomla! 3.2.x < 3.4.4 - SQL Injection [INF] Joomla! 3.4.6 - 'configuration.php' Remote Code Execution [INF] Joomla! 3.2.1 - SQL Injection [INF] Joomla! 3.0.2 - 'highlight.php' PHP Object Injection [INF] Joomla! 3.0.3 - 'remember.php' PHP Object Injection [INF] Joomla! 2.5.0 < 2.5.1 - Blind SQL Injection [INF] Joomla! 2.5.1 - 'redirect.php' Blind SQL Injection [INF] Joomla! < 2.5.2 - Admin Creation [INF] Joomla! 1.6 - Multiple SQL Injections [WRN] Finished Joomla vulnerabilities scanner...

the strong vulnerabilities are false positiv, they are not matching the version detected. can you please fix this.

d4op commented 3 years ago

https://github.com/oppsec/juumla/blob/main/src/juumla/modules/vulns.py

d4op commented 3 years ago

plus there are many more Vulns like the one you stored in your json file. ie: https://www.exploit-db.com/search?q=joomla&verified=true

d4op commented 3 years ago

{ "SEARCH": "Joomla", "DB_PATH_EXPLOIT": "/usr/share/exploitdb", "RESULTS_EXPLOIT": [ {"Title":"Joomla! 1.0.7 / Mambo 4.5.3 - 'feed' Full Path Disclosure / Denial of Service","URL":"https://www.exploit-db.com/exploits/1698"}, {"Title":"Joomla! 1.0.9 - 'Weblinks' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/1922"}, {"Title":"Joomla! 1.0.x - 'ordering' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/35167"}, {"Title":"Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3781"}, {"Title":"Joomla! < 1.5.11 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities","URL":"https://www.exploit-db.com/exploits/33022"}, {"Title":"Joomla! 1.5.12 - Connect Back","URL":"https://www.exploit-db.com/exploits/11262"}, {"Title":"Joomla! 1.5.12 - read/exec Remote files","URL":"https://www.exploit-db.com/exploits/11263"}, {"Title":"Joomla! 1.5.12 TinyMCE - Remote Code Execution (via Arbitrary File Upload)","URL":"https://www.exploit-db.com/exploits/10183"}, {"Title":"Joomla! 1.5/1.6 - JFilterInput Cross-Site Scripting Bypass","URL":"https://www.exploit-db.com/exploits/16091"}, {"Title":"Joomla! 1.5.22 / 1.6.0 - 'com_mailto' Spam Mail Relay","URL":"https://www.exploit-db.com/exploits/15979"}, {"Title":"Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution","URL":"https://www.exploit-db.com/exploits/38977"}, {"Title":"Joomla! 1.5 < 3.4.5 - Object Injection 'x-forwarded-for' Header Remote Code Execution","URL":"https://www.exploit-db.com/exploits/39033"}, {"Title":"Joomla! 1.5 Beta1/Beta2/RC1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/4350"}, {"Title":"Joomla! 1.5 Beta 2 - 'Search' Remote Code Execution","URL":"https://www.exploit-db.com/exploits/4212"}, {"Title":"Joomla! 1.5 - URL Redirecting","URL":"https://www.exploit-db.com/exploits/14722"}, {"Title":"Joomla! 1.5.x - 404 Error Page Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33378"}, {"Title":"Joomla! 1.5.x - Cross-Site Scripting / Information Disclosure","URL":"https://www.exploit-db.com/exploits/33061"}, {"Title":"Joomla! 1.5.x - SQL Error Information Disclosure","URL":"https://www.exploit-db.com/exploits/34955"}, {"Title":"Joomla! 1.5.x - 'Token' Remote Admin Change Password","URL":"https://www.exploit-db.com/exploits/6234"}, {"Title":"Joomla! 1.6.0 Alpha2 - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/12489"}, {"Title":"Joomla! 1.6.3 - Cross-Site Request Forgery","URL":"https://www.exploit-db.com/exploits/17496"}, {"Title":"Joomla! 1.6.3 - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/35894"}, {"Title":"Joomla! < 1.6.5 - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/35973"}, {"Title":"Joomla! 1.6 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/16992"}, {"Title":"Joomla! < 1.7.0 - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/36176"}, {"Title":"Joomla! 2.5.0 < 2.5.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/18618"}, {"Title":"Joomla! 2.5.1 - 'redirect.php' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/36913"}, {"Title":"Joomla! < 2.5.2 - Admin Creation","URL":"https://www.exploit-db.com/exploits/41156"}, {"Title":"Joomla! 3.0.2 - 'highlight.php' PHP Object Injection","URL":"https://www.exploit-db.com/exploits/24551"}, {"Title":"Joomla! 3.0.3 - 'remember.php' PHP Object Injection","URL":"https://www.exploit-db.com/exploits/25087"}, {"Title":"Joomla! 3.2.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/31459"}, {"Title":"Joomla! 3.2.x < 3.4.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/38534"}, {"Title":"Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation","URL":"https://www.exploit-db.com/exploits/40637"}, {"Title":"Joomla! 3.4.4 Component Content History - SQL Injection / Remote Code Execution (Metasploit)","URL":"https://www.exploit-db.com/exploits/38797"}, {"Title":"Joomla 3.4.6 - 'configuration.php' Remote Code Execution","URL":"https://www.exploit-db.com/exploits/47465"}, {"Title":"Joomla! 3.4.6 - Remote Code Execution (Metasploit)","URL":"https://www.exploit-db.com/exploits/47539"}, {"Title":"Joomla! 3.4.6 - Remote Code Execution","URL":"https://www.exploit-db.com/exploits/47524"}, {"Title":"Joomla! < 3.6.4 - Admin Takeover","URL":"https://www.exploit-db.com/exploits/41157"}, {"Title":"Joomla! 3.7.0 - 'com_fields' SQL Injection","URL":"https://www.exploit-db.com/exploits/42033"}, {"Title":"Joomla! 3.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44227"}, {"Title":"Joomla 3.9.13 - 'Host' Header Injection","URL":"https://www.exploit-db.com/exploits/47632"}, {"Title":"Joomla! Component 3D Cloud - 'tagcloud.swf' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33566"}, {"Title":"Joomla! Component 5starhotels - SQL Injection","URL":"https://www.exploit-db.com/exploits/7575"}, {"Title":"Joomla! Component aardvertiser 2.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12592"}, {"Title":"Joomla! Component Aardvertiser 2.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14922"}, {"Title":"Joomla! Component ABC 1.1.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12429"}, {"Title":"Joomla! Component Abstract 2.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41493"}, {"Title":"Joomla! Component Acajoom 1.1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5273"}, {"Title":"Joomla! Component acctexp 0.12.x - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5721"}, {"Title":"Joomla! Component A Cool Debate 1.0.3 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/17411"}, {"Title":"Joomla! Component actualite 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5337"}, {"Title":"Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection","URL":"https://www.exploit-db.com/exploits/44369"}, {"Title":"Joomla! Component AcySMS 3.5.0 - CSV Macro Injection","URL":"https://www.exploit-db.com/exploits/44370"}, {"Title":"Joomla! Component Address Book 1.5.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12170"}, {"Title":"Joomla! Component Address Book - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14210"}, {"Title":"Joomla! Component Advertisement Board 3.0.4 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41600"}, {"Title":"Joomla! Component Advertisement Board 3.1.0 - 'catname' SQL Injection","URL":"https://www.exploit-db.com/exploits/44105"}, {"Title":"Joomla! Component Advertising 0.25 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12171"}, {"Title":"Joomla! Component Affiliate Datafeeds 880 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12088"}, {"Title":"Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/12132"}, {"Title":"Joomla! Component Agora 3.0.0b (com_agora) - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/9564"}, {"Title":"Joomla! Component AgoraGroup 0.3.5.3 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8814"}, {"Title":"Joomla! Component Aist 2.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/44106"}, {"Title":"Joomla! Component Ajax Chat 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/9888"}, {"Title":"Joomla! Component Ajax Quiz 1.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42532"}, {"Title":"Joomla! Component AJAX Search for K2 2.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41446"}, {"Title":"Joomla! Component AJAX Shoutbox 1.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/32331"}, {"Title":"Joomla! Component Akeeba Kickstart - Unserialize Remote Code Execution (Metasploit)","URL":"https://www.exploit-db.com/exploits/35033"}, {"Title":"Joomla! Component Akobook 2.3 - 'gbid' SQL Injection","URL":"https://www.exploit-db.com/exploits/8911"}, {"Title":"Joomla! Component Alameda 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/18058"}, {"Title":"Joomla! Component Alberghi 2.1.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5278"}, {"Title":"Joomla! Component Alexandria Book Library 3.1.2 - 'letter' SQL Injection","URL":"https://www.exploit-db.com/exploits/44162"}, {"Title":"Joomla! Component allCineVid 1.0.0 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/16010"}, {"Title":"Joomla! Component allvideos - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/12137"}, {"Title":"Joomla! Component AllVideos Reloaded 1.2.x - 'divid' SQL Injection","URL":"https://www.exploit-db.com/exploits/44107"}, {"Title":"Joomla! Component Almond Classifieds 5.6.2 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8619"}, {"Title":"Joomla! Component Almond Classifieds 7.5 - Cross-Site Scripting / SQL Injection","URL":"https://www.exploit-db.com/exploits/33114"}, {"Title":"Joomla! Component Almond Classifieds - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/39016"}, {"Title":"Joomla! Component Almond Classifieds com_aclassf 7.5 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/9258"}, {"Title":"Joomla! Component Alphacontent 2.5.8 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5512"}, {"Title":"Joomla! Component Alphacontent 2.5.8 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5310"}, {"Title":"Joomla! Component AlphaIndex Dictionaries 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45476"}, {"Title":"Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12150"}, {"Title":"Joomla! Component AlphaUserPoints - SQL Injection","URL":"https://www.exploit-db.com/exploits/9654"}, {"Title":"Joomla! Component altas 1.0 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/6002"}, {"Title":"Joomla! Component AltaUserPoints 1.1 - 'userid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41508"}, {"Title":"Joomla! Component Amblog 1.0 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/14596"}, {"Title":"Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/45451"}, {"Title":"Joomla! Component Annuaire - 'index.php?id' SQL Injection","URL":"https://www.exploit-db.com/exploits/35036"}, {"Title":"Joomla! Component Answers 2.3beta - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/13923"}, {"Title":"Joomla! Component Appointment 1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42492"}, {"Title":"Joomla! Component Appointment 1.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12089"}, {"Title":"Joomla! Component AppointmentBookingPro 4.0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41412"}, {"Title":"Joomla! Component Appointments for JomSocial 3.8.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41462"}, {"Title":"Joomla! Component Arcade Games 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12168"}, {"Title":"Joomla! Component archaic binary Gallery 0.2 - Directory Traversal","URL":"https://www.exploit-db.com/exploits/6826"}, {"Title":"Joomla! Component Archery Scores 1.0.6 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12282"}, {"Title":"Joomla! Component ARI Quiz 3.7.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46769"}, {"Title":"Joomla! Component ArtForms 2.1b7.2 rc2 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/14263"}, {"Title":"Joomla! Component ArtForms 2.1 b7 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/8697"}, {"Title":"Joomla! Component Article Factory Manager 4.3.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45477"}, {"Title":"Joomla! Component Article Factory Manager - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/12539"}, {"Title":"Joomla! Component Artist - 'idgalery' SQL Injection","URL":"https://www.exploit-db.com/exploits/5684"}, {"Title":"Joomla! Component Artlinks 1.0b4 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2209"}, {"Title":"Joomla! Component astatsPRO 1.0 - 'refer.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/5138"}, {"Title":"Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection","URL":"https://www.exploit-db.com/exploits/45456"}, {"Title":"Joomla! Component AutarTimonial 1.0.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14249"}, {"Title":"Joomla! Component AutartiTarot - Directory Traversal","URL":"https://www.exploit-db.com/exploits/33590"}, {"Title":"Joomla! Component AutoArticles 3000 - SQL Injection","URL":"https://www.exploit-db.com/exploits/34972"}, {"Title":"Joomla! Component AWDwall 1.5.4 - Local File Inclusion / SQL Injection","URL":"https://www.exploit-db.com/exploits/12113"}, {"Title":"Joomla! Component aWeb Cart Watching System for Virtuemart 2.6.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/40973"}, {"Title":"Joomla! Component aWiki - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12101"}, {"Title":"Joomla! Component AYS Quiz 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41506"}, {"Title":"Joomla! Component Bamboo Simpla Admin Template - SQL Injection","URL":"https://www.exploit-db.com/exploits/10971"}, {"Title":"Joomla! Component Bargain Product VM3 1.0 - 'product_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/42552"}, {"Title":"Joomla! Component Barter Sites 1.3 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/18046"}, {"Title":"Joomla! Component Bazaar Platform 3.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41390"}, {"Title":"Joomla! Component beamospetition 1.0.12 - SQL Injection / Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/7847"}, {"Title":"Joomla! Component beamospetition - SQL Injection","URL":"https://www.exploit-db.com/exploits/5965"}, {"Title":"Joomla! Component BeeHeard 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12239"}, {"Title":"Joomla! Component BF Quiz 1.0 - SQL Injection (2)","URL":"https://www.exploit-db.com/exploits/12796"}, {"Title":"Joomla! Component BF Quiz 1.3.0 - SQL Injection (1)","URL":"https://www.exploit-db.com/exploits/12780"}, {"Title":"Joomla! Component BF Survey Pro Free - SQL Injection","URL":"https://www.exploit-db.com/exploits/9601"}, {"Title":"Joomla! Component Bible Study 1.5.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5710"}, {"Title":"Joomla! Component Biblioteca 1.0 Beta - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/14703"}, {"Title":"Joomla! Component BibTeX 1.3 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/4310"}, {"Title":"Joomla! Component Biitatemplateshop - 'groups' SQL Injection","URL":"https://www.exploit-db.com/exploits/36171"}, {"Title":"Joomla! Component Blog Calendar - SQL Injection","URL":"https://www.exploit-db.com/exploits/40966"}, {"Title":"Joomla! Component Book Library 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/9889"}, {"Title":"Joomla! Component BookLibrary 1.5.2.4 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/8908"}, {"Title":"Joomla! Component BookLibrary 3.6.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41430"}, {"Title":"Joomla! Component Boy Scout Advancement 0.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/8779"}, {"Title":"Joomla! Component Bridge of Hope Template - SQL Injection","URL":"https://www.exploit-db.com/exploits/10964"}, {"Title":"Joomla! Component Brightcode Weblinks - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5993"}, {"Title":"Joomla! Component btg_oglas - HTML / Cross-Site Scripting Injection","URL":"https://www.exploit-db.com/exploits/15468"}, {"Title":"Joomla! Component Calendar Planner 1.0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42501"}, {"Title":"Joomla! Component Camelcitydb2 2.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7775"}, {"Title":"Joomla! Component CamelcityDB 2.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14530"}, {"Title":"Joomla! Component Candle 1.0 - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5221"}, {"Title":"Joomla! Component Canteen 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/34250"}, {"Title":"Joomla! Component Card View JX - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/12474"}, {"Title":"Joomla! Component Car Manager 1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/3564"}, {"Title":"Joomla! Component Carousel Flash Image Gallery - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4626"}, {"Title":"Joomla! Component Casino 0.3.1 - Multiple SQL Injections s","URL":"https://www.exploit-db.com/exploits/8743"}, {"Title":"Joomla! Component Catalog 1.0.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/40851"}, {"Title":"Joomla! Component Catalogue - SQL Injection / Local File Inclusion","URL":"https://www.exploit-db.com/exploits/35024"}, {"Title":"Joomla! Component CB Resume Builder - 'group_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33266"}, {"Title":"Joomla! Component CB Resume Builder - SQL Injection","URL":"https://www.exploit-db.com/exploits/10064"}, {"Title":"Joomla! Component CCBoard 1.2-RC - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/15518"}, {"Title":"Joomla! Component CCBoard - SQL Injection / Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/35826"}, {"Title":"Joomla! Component ccInvoices - SQL Injection","URL":"https://www.exploit-db.com/exploits/15430"}, {"Title":"Joomla! Component CCNewsLetter 1.0.7 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/37101"}, {"Title":"Joomla! Component CCNewsLetter 2.1.9 - 'sbid' SQL Injection","URL":"https://www.exploit-db.com/exploits/42387"}, {"Title":"Joomla Component ccNewsletter 2.x.x 'id' - SQL Injection","URL":"https://www.exploit-db.com/exploits/44132"}, {"Title":"Joomla! Component CCNewsLetter - Directory Traversal","URL":"https://www.exploit-db.com/exploits/11277"}, {"Title":"Joomla! Component CCNewsLetter - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11282"}, {"Title":"Joomla! Component CheckList 1.1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42607"}, {"Title":"Joomla! Component CheckList 1.1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44163"}, {"Title":"Joomla! Component ChronoConnectivity - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/12842"}, {"Title":"Joomla! Component ChronoForms 2.3.5 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/5020"}, {"Title":"Joomla! Component ChronoForms - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/12843"}, {"Title":"Joomla! Component Cinema 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5300"}, {"Title":"Joomla! Component cinema - SQL Injection","URL":"https://www.exploit-db.com/exploits/13792"}, {"Title":"Joomla! Component City Portal - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10550"}, {"Title":"Joomla! Component CiviCRM - Multiple Arbitrary File Upload Vulnerabilities","URL":"https://www.exploit-db.com/exploits/37648"}, {"Title":"Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections","URL":"https://www.exploit-db.com/exploits/14902"}, {"Title":"Joomla! Component Clantools 1.5 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14901"}, {"Title":"Joomla! Component Classified - SQL Injection","URL":"https://www.exploit-db.com/exploits/35135"}, {"Title":"Joomla! Component ClickHeat 1.0.1 - Multiple Remote File Inclusions","URL":"https://www.exploit-db.com/exploits/7038"}, {"Title":"Joomla! Component Club Manager - 'cm_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/34820"}, {"Title":"Joomla! Component Cmimarketplace - 'viewit' Directory Traversal","URL":"https://www.exploit-db.com/exploits/8367"}, {"Title":"Joomla! Component Collection Factory 4.1.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45474"}, {"Title":"Joomla! Component com_abbrev - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/10948"}, {"Title":"Joomla! Component com_about - SQL Injection","URL":"https://www.exploit-db.com/exploits/11684"}, {"Title":"Joomla! Component com_aclsfgpl - 'index.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/38943"}, {"Title":"Joomla! Component com_acmisc - SQL Injection","URL":"https://www.exploit-db.com/exploits/10547"}, {"Title":"Joomla! Component com_acprojects - SQL Injection","URL":"https://www.exploit-db.com/exploits/11480"}, {"Title":"Joomla! Component com_acstartseite - SQL Injection","URL":"https://www.exploit-db.com/exploits/11479"}, {"Title":"Joomla! Component com_acteammember - SQL Injection","URL":"https://www.exploit-db.com/exploits/11483"}, {"Title":"Joomla! Component com_actions - SQL Injection","URL":"https://www.exploit-db.com/exploits/11942"}, {"Title":"Joomla! Component com_adagency - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/10729"}, {"Title":"Joomla! Component com_adds - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11914"}, {"Title":"Joomla! Component com_adsmanager - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/15815"}, {"Title":"Joomla! Component com_agency - SQL Injection","URL":"https://www.exploit-db.com/exploits/11916"}, {"Title":"Joomla! Component Com_Agora 3.0.0 RC1 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/8811"}, {"Title":"Joomla! Component com_airmonoblock - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10817"}, {"Title":"Joomla! Component com_album 1.14 - Directory Traversal","URL":"https://www.exploit-db.com/exploits/9706"}, {"Title":"Joomla! Component com_alert - 'q_item' SQL Injection","URL":"https://www.exploit-db.com/exploits/33771"}, {"Title":"Joomla! Component com_alfcontact 1.9.3 - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/36298"}, {"Title":"Joomla! Component com_alfresco - SQL Injection","URL":"https://www.exploit-db.com/exploits/10952"}, {"Title":"Joomla! Component com_alfurqan15x - SQL Injection","URL":"https://www.exploit-db.com/exploits/15549"}, {"Title":"Joomla! Component com_allhotels - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7568"}, {"Title":"Joomla! Component com_alphacontent - 'limitstart' SQL Injection","URL":"https://www.exploit-db.com/exploits/37374"}, {"Title":"Joomla! Component com_aml_2 - 'art' SQL Injection","URL":"https://www.exploit-db.com/exploits/33795"}, {"Title":"Joomla! Component com_amocourse - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/9016"}, {"Title":"Joomla! Component com_annonces - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/13748"}, {"Title":"Joomla! Component com_appointinator 1.0.1 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/14488"}, {"Title":"Joomla! Component com_aprice - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10941"}, {"Title":"Joomla! Component com_articlemanager - SQL Injection","URL":"https://www.exploit-db.com/exploits/11140"}, {"Title":"Joomla! Component com_articles - SQL Injection","URL":"https://www.exploit-db.com/exploits/12108"}, {"Title":"Joomla! Component com_artportal 1.0 - 'portalid' SQL Injection","URL":"https://www.exploit-db.com/exploits/9563"}, {"Title":"Joomla! Component com_as - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/33766"}, {"Title":"Joomla! Component com_avosbillets - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10905"}, {"Title":"Joomla! Component com_avosbillets - SQL Injection","URL":"https://www.exploit-db.com/exploits/11223"}, {"Title":"Joomla! Component com_b2portfolio 1.0.0 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/16039"}, {"Title":"Joomla! Component com_bayesiannaivefilter 1.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2090"}, {"Title":"Joomla! Component Com BazaarBuilder Shopping Cart 5.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7840"}, {"Title":"Joomla! Component com_bbs - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/36642"}, {"Title":"Joomla! Component com_bca-rss-syndicator - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12069"}, {"Title":"Joomla! Component com_beamospetition - SQL Injection","URL":"https://www.exploit-db.com/exploits/14502"}, {"Title":"Joomla! Component com_bearleague - SQL Injection","URL":"https://www.exploit-db.com/exploits/18729"}, {"Title":"Joomla! Component com_beeheard - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10734"}, {"Title":"Joomla! Component com_bfsurvey_basic - SQL Injection","URL":"https://www.exploit-db.com/exploits/10944"}, {"Title":"Joomla! Component com_bfsurvey - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/10946"}, {"Title":"Joomla! Component com_bfsurvey_pro - 'catid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10945"}, {"Title":"Joomla! Component com_biblestudy - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/10943"}, {"Title":"Joomla! Component com_bidding - SQL Injection","URL":"https://www.exploit-db.com/exploits/11766"}, {"Title":"Joomla! Component com_billyportfolio 1.1.2 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/15721"}, {"Title":"Joomla! Component com_biographies - SQL Injection","URL":"https://www.exploit-db.com/exploits/11226"}, {"Title":"Joomla! Component com_bit - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/38135"}, {"Title":"Joomla! Component com_blog - Directory Traversal","URL":"https://www.exploit-db.com/exploits/11625"}, {"Title":"Joomla! Component com_blog - SQL Injection","URL":"https://www.exploit-db.com/exploits/11688"}, {"Title":"Joomla! Component com_bnf - 'seccion_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36657"}, {"Title":"Joomla! Component com_bookflip - 'book_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/9040"}, {"Title":"Joomla! Component com_bookJoomlas 0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/8353"}, {"Title":"Joomla! Component com_booklibrary - SQL Injection","URL":"https://www.exploit-db.com/exploits/16995"}, {"Title":"Joomla! Component com_books - 'book_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/7092"}, {"Title":"Joomla! Component com_book - SQL Injection","URL":"https://www.exploit-db.com/exploits/11213"}, {"Title":"Joomla! Component com_boss - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/36594"}, {"Title":"Joomla! Component com_br - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/36589"}, {"Title":"Joomla! Component com_br - 'state_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36221"}, {"Title":"Joomla! Component com_bt_media 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/39977"}, {"Title":"Joomla! Component com_bulkenquery - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/36597"}, {"Title":"Joomla! Component com_business - SQL Injection","URL":"https://www.exploit-db.com/exploits/11928"}, {"Title":"Joomla! Component com_calcbuilder - 'id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/17414"}, {"Title":"Joomla! Component com_calendario - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10760"}, {"Title":"Joomla! Component com_camp - SQL Injection","URL":"https://www.exploit-db.com/exploits/12615"}, {"Title":"Joomla! Component com_caproductprices - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36472"}, {"Title":"Joomla! Component com_carman - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/10624"}, {"Title":"Joomla! Component com_car - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/36595"}, {"Title":"Joomla! Component com_cartikads 1.0 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/10984"}, {"Title":"Joomla! Component com_cartweberp - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/10942"}, {"Title":"Joomla! Component com_casino - SQL Injection","URL":"https://www.exploit-db.com/exploits/11237"}, {"Title":"Joomla! Component com_ca - SQL Injection","URL":"https://www.exploit-db.com/exploits/12138"}, {"Title":"Joomla! Component com_category - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/9126"}, {"Title":"Joomla! Component com_cb - 'cat' SQL Injection","URL":"https://www.exploit-db.com/exploits/33796"}, {"Title":"Joomla! Component com_cbcontact - 'contact_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/35745"}, {"Title":"Joomla! Component com_cgtestimonial 2.2 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/14569"}, {"Title":"Joomla! Component com_civicrm 4.2.2 - Remote Code Injection","URL":"https://www.exploit-db.com/exploits/24969"}, {"Title":"Joomla! Component com_ckforms - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/11785"}, {"Title":"Joomla! Component com_clanlist - SQL Injection","URL":"https://www.exploit-db.com/exploits/15456"}, {"Title":"Joomla! Component com_clan_members - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/35294"}, {"Title":"Joomla! Component com_clan - SQL Injection","URL":"https://www.exploit-db.com/exploits/15454"}, {"Title":"Joomla! Component com_clasifier - 'cat_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5146"}, {"Title":"Joomla! Component com_cmotour - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36646"}, {"Title":"Joomla! Component com_collector - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/24228"}, {"Title":"Joomla! Component com_colorlab 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4524"}, {"Title":"Joomla! Component com_color - SQL Injection","URL":"https://www.exploit-db.com/exploits/11693"}, {"Title":"Joomla! Component com_commedia - 'task' SQL Injection","URL":"https://www.exploit-db.com/exploits/22152"}, {"Title":"Joomla! Component com_community 2.6 - Code Execution","URL":"https://www.exploit-db.com/exploits/31435"}, {"Title":"Joomla! Component com_community - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/13955"}, {"Title":"Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11511"}, {"Title":"Joomla! Component com_community - 'userid' SQL Injection","URL":"https://www.exploit-db.com/exploits/36015"}, {"Title":"Joomla! Component com_comp - SQL Injection","URL":"https://www.exploit-db.com/exploits/11709"}, {"Title":"Joomla! Component com_connect - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15439"}, {"Title":"Joomla! Component com_ContentBlogList - SQL Injection","URL":"https://www.exploit-db.com/exploits/11236"}, {"Title":"Joomla! Component com_contushdvideoshare 1.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36549"}, {"Title":"Joomla! Component com_countries - SQL Injection","URL":"https://www.exploit-db.com/exploits/10949"}, {"Title":"Joomla! Component com_crhotels - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/36638"}, {"Title":"Joomla! Component com_crowdsource - SQL Injection","URL":"https://www.exploit-db.com/exploits/12632"}, {"Title":"Joomla! Component com_dailymeals - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/10928"}, {"Title":"Joomla! Component com_dashboard - Directory Traversal","URL":"https://www.exploit-db.com/exploits/11086"}, {"Title":"Joomla! Component com_dateconverter 0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14154"}, {"Title":"Joomla! Component com_dcnews - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15440"}, {"Title":"Joomla! Component com_departments - SQL Injection","URL":"https://www.exploit-db.com/exploits/11927"}, {"Title":"Joomla! Component com_d-greinar - 'maintree' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33757"}, {"Title":"Joomla! Component com_dhforum - SQL Injection","URL":"https://www.exploit-db.com/exploits/10742"}, {"Title":"Joomla! Component com_digifolio 1.52 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/9534"}, {"Title":"Joomla! Component com_digistore - 'pid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8134"}, {"Title":"Joomla! Component com_digistore - SQL Injection","URL":"https://www.exploit-db.com/exploits/10546"}, {"Title":"Joomla! Component com_dirfrm - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/34484"}, {"Title":"Joomla! Component com_discussions - SQL Injection","URL":"https://www.exploit-db.com/exploits/18380"}, {"Title":"Joomla! Component com_djcatalog - SQL Injection / Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9693"}, {"Title":"Joomla! Component com_djClassifieds 0.9.1 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/12479"}, {"Title":"Joomla! Component com_dms 2.5.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/11289"}, {"Title":"Joomla! Component com_docman - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/37620"}, {"Title":"Joomla! Component com_doc - SQL Injection","URL":"https://www.exploit-db.com/exploits/5080"}, {"Title":"Joomla! Component com_doqment - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/10965"}, {"Title":"Joomla! Component com_dshop - SQL Injection","URL":"https://www.exploit-db.com/exploits/18251"}, {"Title":"Joomla! Component com_enmasse 1.2.0.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/20343"}, {"Title":"Joomla! Component com_enmasse 5.1 < 6.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/39953"}, {"Title":"Joomla! Component com_eportfolio - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/13951"}, {"Title":"Joomla! Component com_equipment - SQL Injection","URL":"https://www.exploit-db.com/exploits/14655"}, {"Title":"Joomla! Component com_Eventing 1.6.x - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7793"}, {"Title":"Joomla! Component com_event - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/12633"}, {"Title":"Joomla! Component com_event - SQL Injection","URL":"https://www.exploit-db.com/exploits/12639"}, {"Title":"Joomla! Component com_expedition - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36215"}, {"Title":"Joomla! Component com_extcalendar - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14694"}, {"Title":"Joomla! Component com_extplorer 2.0.0 RC2 - Local Directory Traversal","URL":"https://www.exploit-db.com/exploits/5435"}, {"Title":"Joomla! Component com_facebook - SQL Injection","URL":"https://www.exploit-db.com/exploits/9833"}, {"Title":"Joomla! Component com_facegallery 1.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/34754"}, {"Title":"Joomla! Component com_family - SQL Injection","URL":"https://www.exploit-db.com/exploits/11699"}, {"Title":"Joomla! Component com_fireboard - 'Itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/34477"}, {"Title":"Joomla! Component com_fireboard - SQL Injection","URL":"https://www.exploit-db.com/exploits/20390"}, {"Title":"Joomla! Component com_firmy - 'Id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36635"}, {"Title":"Joomla! Component com_flash - SQL Injection","URL":"https://www.exploit-db.com/exploits/11844"}, {"Title":"Joomla! Component com_foobla_suggestions (idea_id) 1.5.11 - SQL Injection","URL":"https://www.exploit-db.com/exploits/9697"}, {"Title":"Joomla! Component com_football - SQL Injection","URL":"https://www.exploit-db.com/exploits/12017"}, {"Title":"Joomla! Component com_forme 1.0.5 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/15443"}, {"Title":"Joomla! Component com_formmaker 3.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/34637"}, {"Title":"Joomla! Component com_frontenduseraccess - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/35295"}, {"Title":"Joomla! Component com_fss 1.9.1.1447 - SQL Injection","URL":"https://www.exploit-db.com/exploits/22097"}, {"Title":"Joomla! Component com_g2bridge - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12814"}, {"Title":"Joomla! Component com_galeria - SQL Injection","URL":"https://www.exploit-db.com/exploits/5134"}, {"Title":"Joomla! Component com_gallery_wd - SQL Injection","URL":"https://www.exploit-db.com/exploits/36560"}, {"Title":"Joomla! Component com_gambling - 'gamblingEvent' SQL Injection","URL":"https://www.exploit-db.com/exploits/33586"}, {"Title":"Joomla! Component com_gameserver 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/9571"}, {"Title":"Joomla! Component com_gameserver - SQL Injection","URL":"https://www.exploit-db.com/exploits/11222"}, {"Title":"Joomla! Component com_ganalytics - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11758"}, {"Title":"Joomla! Component com_gcalendar 1.1.2 - 'gcid' SQL Injection","URL":"https://www.exploit-db.com/exploits/10232"}, {"Title":"Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11738"}, {"Title":"Joomla! Component com_gds - SQL Injection","URL":"https://www.exploit-db.com/exploits/11847"}, {"Title":"Joomla! Component com_gigfe - SQL Injection","URL":"https://www.exploit-db.com/exploits/11692"}, {"Title":"Joomla! Component com_gmaps 1.00 - 'mapId' SQL Injection","URL":"https://www.exploit-db.com/exploits/4248"}, {"Title":"Joomla! Component com_google - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12290"}, {"Title":"Joomla! Component com_gsticketsystem - 'catid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8731"}, {"Title":"Joomla! Component com_guide - SQL Injection","URL":"https://www.exploit-db.com/exploits/11935"}, {"Title":"Joomla! Component com_gurujibook - SQL Injection","URL":"https://www.exploit-db.com/exploits/11225"}, {"Title":"Joomla! Component com_hbssearch 1.0 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7538"}, {"Title":"Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download","URL":"https://www.exploit-db.com/exploits/35246"}, {"Title":"Joomla! Component com_hdflvplayer < 2.1.0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/35220"}, {"Title":"Joomla! Component com_hdvideoshare - SQL Injection","URL":"https://www.exploit-db.com/exploits/11464"}, {"Title":"Joomla! Component com_hello - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/37519"}, {"Title":"Joomla! Component com_hello - SQL Injection","URL":"https://www.exploit-db.com/exploits/17265"}, {"Title":"Joomla! Component com_hezacontent 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/11667"}, {"Title":"Joomla! Component com_horses - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/34021"}, {"Title":"Joomla! Component com_hospital - SQL Injection","URL":"https://www.exploit-db.com/exploits/35959"}, {"Title":"Joomla! Component com_hotbrackets - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10953"}, {"Title":"Joomla! Component com_hotspots - SQL Injection","URL":"https://www.exploit-db.com/exploits/6692"}, {"Title":"Joomla! Component com_icagenda - 'id' Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/22004"}, {"Title":"Joomla! Component com_ice - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11544"}, {"Title":"Joomla! Component com_idoblog - SQL Injection","URL":"https://www.exploit-db.com/exploits/15827"}, {"Title":"Joomla! Component com_if_nexus - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/10754"}, {"Title":"Joomla! Component com_iJoomla_archive - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8164"}, {"Title":"Joomla! Component com_iJoomla_rss - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8959"}, {"Title":"Joomla! Component com_img - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15470"}, {"Title":"Joomla! Component com_incapsula - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/38171"}, {"Title":"Joomla! Component com_include - SQL Injection","URL":"https://www.exploit-db.com/exploits/11782"}, {"Title":"Joomla! Component com_informations - SQL Injection","URL":"https://www.exploit-db.com/exploits/37774"}, {"Title":"Joomla! Component com_intuit - Apache Directory listing Download","URL":"https://www.exploit-db.com/exploits/10811"}, {"Title":"Joomla! Component com_intuit - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/10730"}, {"Title":"Joomla! Component com_iproperty - SQL Injection","URL":"https://www.exploit-db.com/exploits/14450"}, {"Title":"Joomla! Component com_itarmory - SQL Injection","URL":"https://www.exploit-db.com/exploits/14463"}, {"Title":"Joomla! Component com_items - SQL Injection","URL":"https://www.exploit-db.com/exploits/11941"}, {"Title":"Joomla! Component com_jajobboard - Multiple Local File Inclusions","URL":"https://www.exploit-db.com/exploits/12144"}, {"Title":"Joomla! Component com_janews - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11757"}, {"Title":"Joomla! Component com_jashowcase - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/7717"}, {"Title":"Joomla! Component com_jashowcase - Directory Traversal","URL":"https://www.exploit-db.com/exploits/11090"}, {"Title":"Joomla! Component com_jbook - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10545"}, {"Title":"Joomla! Component com_jbpublishdownfp - SQL Injection","URL":"https://www.exploit-db.com/exploits/11238"}, {"Title":"Joomla! Component com_jbudgetsmagic 0.3.2 < 0.4.0 - 'bid' SQL Injection","URL":"https://www.exploit-db.com/exploits/9723"}, {"Title":"Joomla! Component com_jcalpro 1.5.3.6 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/10587"}, {"Title":"Joomla! Component com_jcollection - Directory Traversal","URL":"https://www.exploit-db.com/exploits/11088"}, {"Title":"Joomla! Component com_jcommunity - SQL Injection","URL":"https://www.exploit-db.com/exploits/13798"}, {"Title":"Joomla! Component com_jdirectory - SQL Injection","URL":"https://www.exploit-db.com/exploits/17603"}, {"Title":"Joomla! Component com_jdrugstopics - SQL Injection","URL":"https://www.exploit-db.com/exploits/12183"}, {"Title":"Joomla! Component com_jeemaarticlecollection - SQL Injection","URL":"https://www.exploit-db.com/exploits/10625"}, {"Title":"Joomla! Component com_jeemasms 3.2 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/18047"}, {"Title":"Joomla! Component com_jejob - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14063"}, {"Title":"Joomla! Component com_jem 2.1.4 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/37767"}, {"Title":"Joomla! Component com_jesectionfinder - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/12432"}, {"Title":"Joomla! Component com_jeux - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/32473"}, {"Title":"Joomla! Component com_jfuploader < 2.12 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/15353"}, {"Title":"Joomla! Component com_jfusion - 'itemID' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9324"}, {"Title":"Joomla! Component com_jgrid 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14656"}, {"Title":"Joomla! Component com_jigsaw - 'Controller' Directory Traversal","URL":"https://www.exploit-db.com/exploits/34393"}, {"Title":"Joomla! Component com_jim 1.0.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2203"}, {"Title":"Joomla! Component com_jinc 0.2 - 'newsid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9732"}, {"Title":"Joomla! Component com_jlord_rss - 'id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9698"}, {"Title":"Joomla! Component com_jmarket - SQL Injection","URL":"https://www.exploit-db.com/exploits/13799"}, {"Title":"Joomla! Component com_jmsfileseller - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/17338"}, {"Title":"Joomla! Component com_jnews 8.5.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/38565"}, {"Title":"Joomla! Component com_jnewsletter - SQL Injection","URL":"https://www.exploit-db.com/exploits/13804"}, {"Title":"Joomla! Component com_jobprofile - SQL Injection","URL":"https://www.exploit-db.com/exploits/18192"}, {"Title":"Joomla! Component com_job - 'showMoreUse' SQL Injection","URL":"https://www.exploit-db.com/exploits/10356"}, {"Title":"Joomla! Component com_jomestate - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/13956"}, {"Title":"Joomla! Component com_jomtube - 'user_id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14434"}, {"Title":"Joomla! Component Com_Joomclip - 'cat' SQL Injection","URL":"https://www.exploit-db.com/exploits/10192"}, {"Title":"Joomla! Component com_joomdocs - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/13922"}, {"Title":"Joomla! Component com_joomgalaxy 1.2.0.4 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/20197"}, {"Title":"Joomla! Component com_joomgallery 1.5.x - &func Incorrect Flood Filter","URL":"https://www.exploit-db.com/exploits/10312"}, {"Title":"Joomla! Component com_Joomlaconnect_be - Blind Injection","URL":"https://www.exploit-db.com/exploits/11578"}, {"Title":"Joomla! Component com_Joomlaoads - 'packageId' SQL Injection","URL":"https://www.exploit-db.com/exploits/9238"}, {"Title":"Joomla! Component com_Joomlaub - 'aid' SQL Injection","URL":"https://www.exploit-db.com/exploits/9593"}, {"Title":"Joomla! Component com_joomnik - SQL Injection","URL":"https://www.exploit-db.com/exploits/17341"}, {"Title":"Joomla! Component com_joomportfolio - Blind Injection","URL":"https://www.exploit-db.com/exploits/11463"}, {"Title":"Joomla! Component com_joomportfolio - 'secid' SQL Injection","URL":"https://www.exploit-db.com/exploits/33418"}, {"Title":"Joomla! Component com_jooproperty 1.13.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/23286"}, {"Title":"Joomla! Component com_jphoto - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/10367"}, {"Title":"Joomla! Component com_j-projects - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10988"}, {"Title":"Joomla! Component com_jresearch - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/33797"}, {"Title":"Joomla! Component com_jreservation 1.5 - 'pid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9713"}, {"Title":"Joomla! Component com_jr_tfb - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/35922"}, {"Title":"Joomla! Component com_jsjobs 1.0.5.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/10366"}, {"Title":"Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion","URL":"https://www.exploit-db.com/exploits/47281"}, {"Title":"Joomla! Component com_jstore - SQL Injection","URL":"https://www.exploit-db.com/exploits/13796"}, {"Title":"Joomla! Component com_jsubscription - SQL Injection","URL":"https://www.exploit-db.com/exploits/13800"}, {"Title":"Joomla! Component com_jtickets - SQL Injection","URL":"https://www.exploit-db.com/exploits/13797"}, {"Title":"Joomla! Component com_jtips 1.0.x - 'season' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9504"}, {"Title":"Joomla! Component com_juliaportfolio - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11707"}, {"Title":"Joomla! Component com_jvideodirect - Directory Traversal","URL":"https://www.exploit-db.com/exploits/11089"}, {"Title":"Joomla! Component com_jwmmxtd - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/11845"}, {"Title":"Joomla! Component com_K2 -q 1.0.1b - 'category' SQL Injection","URL":"https://www.exploit-db.com/exploits/9030"}, {"Title":"Joomla! Component com_king - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11035"}, {"Title":"Joomla! Component com_kk - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11033"}, {"Title":"Joomla! Component com_kkcontent - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10790"}, {"Title":"Joomla! Component com_kp - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/36598"}, {"Title":"Joomla! Component com_ksadvertiser - Remote File / Bypass Upload","URL":"https://www.exploit-db.com/exploits/19792"}, {"Title":"Joomla! Component com_ksadvertiser - SQL Injection","URL":"https://www.exploit-db.com/exploits/11068"}, {"Title":"Joomla! Component com_kunena - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11279"}, {"Title":"Joomla! Component com_kunena - 'search' SQL Injection","URL":"https://www.exploit-db.com/exploits/22153"}, {"Title":"Joomla! Component com_leader - SQL Injection","URL":"https://www.exploit-db.com/exploits/11698"}, {"Title":"Joomla! Component com_lead - SQL Injection","URL":"https://www.exploit-db.com/exploits/12868"}, {"Title":"Joomla! Component com_libros - SQL Injection","URL":"https://www.exploit-db.com/exploits/11178"}, {"Title":"Joomla! Component com_linkr - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11756"}, {"Title":"Joomla! Component com_listbingo 1.3 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/13926"}, {"Title":"Joomla! Component com_liveticker - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11604"}, {"Title":"Joomla! Component com_lowcosthotels - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7567"}, {"Title":"Joomla! Component com_lyftenbloggie 1.04 - SQL Injection","URL":"https://www.exploit-db.com/exploits/10238"}, {"Title":"Joomla! Component com_macgallery 1.5 - Arbitrary File Download","URL":"https://www.exploit-db.com/exploits/34755"}, {"Title":"Joomla! Component com_maianmedia - SQL Injection","URL":"https://www.exploit-db.com/exploits/15555"}, {"Title":"Joomla! Component com_mailto - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/35096"}, {"Title":"Joomla! Component com_manager 1.5.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/12257"}, {"Title":"Joomla! Component com_Marketplace 1.1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5055"}, {"Title":"Joomla! Component com_marketplace 1.2.1 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/7097"}, {"Title":"Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33529"}, {"Title":"Joomla! Component com_markt - SQL Injection","URL":"https://www.exploit-db.com/exploits/15469"}, {"Title":"Joomla! Component com_mdigg - SQL Injection","URL":"https://www.exploit-db.com/exploits/10847"}, {"Title":"Joomla! Component com_mediaalert - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33218"}, {"Title":"Joomla! Component com_media_library 1.5.3 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/8912"}, {"Title":"Joomla! Component com_mediaslide - Directory Traversal","URL":"https://www.exploit-db.com/exploits/10591"}, {"Title":"Joomla! Component com_mediqna 1.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12769"}, {"Title":"Joomla! Component com_memorix - SQL Injection","URL":"https://www.exploit-db.com/exploits/37773"}, {"Title":"Joomla! Component com_menu - SQL Injection","URL":"https://www.exploit-db.com/exploits/12015"}, {"Title":"Joomla! Component com_mochigames - SQL Injection","URL":"https://www.exploit-db.com/exploits/11243"}, {"Title":"Joomla! Component com_morfeoshow - 'idm' SQL Injection","URL":"https://www.exploit-db.com/exploits/35883"}, {"Title":"Joomla! Component com_mosres - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/8872"}, {"Title":"Joomla! Component com_motor - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/36629"}, {"Title":"Joomla! Component com_movm - SQL Injection","URL":"https://www.exploit-db.com/exploits/20170"}, {"Title":"Joomla! Component com_mtree 2.1.5 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/14995"}, {"Title":"Joomla! Component com_mtree 2.1.6 - Overwrite Cross-Site Request Forgery","URL":"https://www.exploit-db.com/exploits/15570"}, {"Title":"Joomla! Component Community Builder 1.0.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5491"}, {"Title":"Joomla! Component Community Builder Enhanced (CBE) 1.4.8/1.4.9/1.4.10 - Local File Inclusion / Remote Code Execution","URL":"https://www.exploit-db.com/exploits/15222"}, {"Title":"Joomla! Component Community Polls 4.5.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41448"}, {"Title":"Joomla! Component Community Quiz 4.3.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41452"}, {"Title":"Joomla! Component Community Surveys 4.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41447"}, {"Title":"Joomla! Component com_mygallery - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/10227"}, {"Title":"Joomla! Component com_mytube (user_id) 1.0 Beta - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9733"}, {"Title":"Joomla! Component com_na_content 1.0 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7612"}, {"Title":"Joomla! Component com_na_newsdescription - 'newsid' SQL Injection","URL":"https://www.exploit-db.com/exploits/7669"}, {"Title":"Joomla! Component com_network - SQL Injection","URL":"https://www.exploit-db.com/exploits/11990"}, {"Title":"Joomla! Component com_newsflash - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/7718"}, {"Title":"Joomla! Component com_newssearch - SQL Injection","URL":"https://www.exploit-db.com/exploits/35966"}, {"Title":"Joomla! Component com_news - SQL Injection","URL":"https://www.exploit-db.com/exploits/7828"}, {"Title":"Joomla! Component com_nfnaddressbook - SQL Injection","URL":"https://www.exploit-db.com/exploits/11730"}, {"Title":"Joomla! Component com_niceajaxpoll 1.3.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/20166"}, {"Title":"Joomla! Component com_ninjamonial 1.1 - 'testimID' SQL Injection","URL":"https://www.exploit-db.com/exploits/9502"}, {"Title":"Joomla! Component com_noticia - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/10789"}, {"Title":"Joomla! Component com_noticias 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5081"}, {"Title":"Joomla! Component com_ongallery - SQL Injection","URL":"https://www.exploit-db.com/exploits/14659"}, {"Title":"Joomla! Component com_oprykningspoint_mc - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/10739"}, {"Title":"Joomla! Component com_ops - SQL Injection","URL":"https://www.exploit-db.com/exploits/12016"}, {"Title":"Joomla! Component com_org - 'letter' SQL Injection","URL":"https://www.exploit-db.com/exploits/11752"}, {"Title":"Joomla! Component com_org - SQL Injection","URL":"https://www.exploit-db.com/exploits/11725"}, {"Title":"Joomla! Component com_osproperty 2.0.2 - Unrestricted Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/19829"}, {"Title":"Joomla! Component com_otzivi - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10966"}, {"Title":"Joomla! Component com_otzivi - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11494"}, {"Title":"Joomla! Component com_oziogallery2 / IMAGIN - Arbitrary File Write","URL":"https://www.exploit-db.com/exploits/10979"}, {"Title":"Joomla! Component com_packages - SQL Injection","URL":"https://www.exploit-db.com/exploits/12648"}, {"Title":"Joomla! Component com_pandafminigames - SQL Injection","URL":"https://www.exploit-db.com/exploits/12270"}, {"Title":"Joomla! Component com_party - SQL Injection","URL":"https://www.exploit-db.com/exploits/11695"}, {"Title":"Joomla! Component com_paxgallery - Blind Injection","URL":"https://www.exploit-db.com/exploits/11595"}, {"Title":"Joomla! Component com_payplans 3.3.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/39936"}, {"Title":"Joomla! Component com_pbbooking 1.0.4_3 - Multiple Blind SQL Injections","URL":"https://www.exploit-db.com/exploits/14499"}, {"Title":"Joomla! Component com_pcchess - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7846"}, {"Title":"Joomla! Component com_pcchess - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12123"}, {"Title":"Joomla! Component com_pccookbook - 'recipe_id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7824"}, {"Title":"Joomla! Component com_pccookbook - 'user_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5145"}, {"Title":"Joomla! Component com_pc - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11168"}, {"Title":"Joomla! Component com_people 1.0.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/16001"}, {"Title":"Joomla! Component com_perchagallery - SQL Injection","URL":"https://www.exploit-db.com/exploits/11024"}, {"Title":"Joomla! Component com_personal - SQL Injection","URL":"https://www.exploit-db.com/exploits/11920"}, {"Title":"Joomla! Component com_phocadocumentation - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/7670"}, {"Title":"Joomla! Component com_phocadownload - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/35630"}, {"Title":"Joomla! Component com_photoblog - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11337"}, {"Title":"Joomla! Component com_photomapgallery 1.6.0 - Multiple Blind SQL Injections","URL":"https://www.exploit-db.com/exploits/14495"}, {"Title":"Joomla! Component com_photo - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/37575"}, {"Title":"Joomla! Component com_PHP 0.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12579"}, {"Title":"Joomla! Component com_php - 'id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9028"}, {"Title":"Joomla! Component com_pinboard - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/9011"}, {"Title":"Joomla! Component com_pinboard - 'task' SQL Injection","URL":"https://www.exploit-db.com/exploits/9017"}, {"Title":"Joomla! Component com_pms 2.0.4 - 'Ignore-List' SQL Injection","URL":"https://www.exploit-db.com/exploits/9398"}, {"Title":"Joomla! Component com_ponygallery - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/15814"}, {"Title":"Joomla! Component com_ponygallery - SQL Injection","URL":"https://www.exploit-db.com/exploits/18741"}, {"Title":"Joomla! Component com_portafolio - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/8905"}, {"Title":"Joomla! Component com_portfolio - Local File Disclosure","URL":"https://www.exploit-db.com/exploits/12325"}, {"Title":"Joomla! Component com_portfol - SQL Injection","URL":"https://www.exploit-db.com/exploits/10844"}, {"Title":"Joomla! Component com_poweradmin 2.3.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/39506"}, {"Title":"Joomla! Component com_pressrelease - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33217"}, {"Title":"Joomla! Component com_press - SQL Injection","URL":"https://www.exploit-db.com/exploits/12057"}, {"Title":"Joomla! Component com_prime - Directory Traversal","URL":"https://www.exploit-db.com/exploits/11177"}, {"Title":"Joomla! Component com_productbook - SQL Injection","URL":"https://www.exploit-db.com/exploits/11352"}, {"Title":"Joomla! Component com_products - 'intCategoryId' SQL Injection","URL":"https://www.exploit-db.com/exploits/11691"}, {"Title":"Joomla! Component com_products - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/36630"}, {"Title":"Joomla! Component com_Projectfork 2.0.10 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/8946"}, {"Title":"Joomla! Component com_propertylab - 'auction_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/9112"}, {"Title":"Joomla! Component com_propertylab - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36639"}, {"Title":"Joomla! Component com_publisher - SQL Injection","URL":"https://www.exploit-db.com/exploits/39989"}, {"Title":"Joomla! Component com_qcontacts 1.0.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/18218"}, {"Title":"Joomla! Component com_qcontacts - SQL Injection","URL":"https://www.exploit-db.com/exploits/14350"}, {"Title":"Joomla! Component com_qpersonel - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/10738"}, {"Title":"Joomla! Component com_question - SQL Injection","URL":"https://www.exploit-db.com/exploits/17288"}, {"Title":"Joomla! Component com_quiz - SQL Injection","URL":"https://www.exploit-db.com/exploits/37993"}, {"Title":"Joomla! Component com_quran - SQL Injection","URL":"https://www.exploit-db.com/exploits/12812"}, {"Title":"Joomla! Component com_races - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11710"}, {"Title":"Joomla! Component com_radio - SQL Injection","URL":"https://www.exploit-db.com/exploits/11929"}, {"Title":"Joomla! Component com_rand - SQL Injection","URL":"https://www.exploit-db.com/exploits/36601"}, {"Title":"Joomla! Component com_ranking - SQL Injection","URL":"https://www.exploit-db.com/exploits/12062"}, {"Title":"Joomla! Component com_rd_download - Local File Disclosure","URL":"https://www.exploit-db.com/exploits/10822"}, {"Title":"Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/8919"}, {"Title":"Joomla! Component com_realestatemanager 3.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/38445"}, {"Title":"Joomla! Component com_recipe - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/33659"}, {"Title":"Joomla! Component com_record - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12181"}, {"Title":"Joomla! Component com_redirect 1.5.19 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/35097"}, {"Title":"Joomla! Component com_remository - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/14811"}, {"Title":"Joomla! Component com_rokdownloads - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/38592"}, {"Title":"Joomla! Component com_rokdownloads - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11760"}, {"Title":"Joomla! Component com_route - SQL Injection","URL":"https://www.exploit-db.com/exploits/11767"}, {"Title":"Joomla! Component com_rpx Ulti RPX 2.1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11743"}, {"Title":"Joomla! Component com_rsappt_pro2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/17553"}, {"Title":"Joomla! Component com_rsfiles - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/24851"}, {"Title":"Joomla! Component com_rsgallery2 1.14.x/2.x - Remote Backdoor Access","URL":"https://www.exploit-db.com/exploits/8801"}, {"Title":"Joomla! Component com_rsgallery2 2.0 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/33582"}, {"Title":"Joomla! Component com_rwcards - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11772"}, {"Title":"Joomla! Component com_s5clanroster - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/25410"}, {"Title":"Joomla! Component com_s5clanroster - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12231"}, {"Title":"Joomla! Component com_sar_news - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/34071"}, {"Title":"Joomla! Component com_sbsfile - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11708"}, {"Title":"Joomla! Component com_school 1.4 - 'classid' SQL Injection","URL":"https://www.exploit-db.com/exploits/8891"}, {"Title":"Joomla! Component com_schools - SQL Injection","URL":"https://www.exploit-db.com/exploits/10640"}, {"Title":"Joomla! Component com_science - SQL Injection","URL":"https://www.exploit-db.com/exploits/11918"}, {"Title":"Joomla! Component com_search 1.5 RC3 - 'index.php' Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/30849"}, {"Title":"Joomla! Component com_sebercart - 'getPic.php' Local File Disclosure","URL":"https://www.exploit-db.com/exploits/12594"}, {"Title":"Joomla! Component com_sectionex 2.5.96 - SQL Injection","URL":"https://www.exploit-db.com/exploits/27405"}, {"Title":"Joomla! Component com_sectionex - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11759"}, {"Title":"Joomla! Component com_seek - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33756"}, {"Title":"Joomla! Component com_sef - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14213"}, {"Title":"Joomla! Component com_sef - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/14055"}, {"Title":"Joomla! Component com_serie - SQL Injection","URL":"https://www.exploit-db.com/exploits/12060"}, {"Title":"Joomla! Component com_seyret - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14172"}, {"Title":"Joomla! Component com_seyret - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14183"}, {"Title":"Joomla! Component com_sgicatalog 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36227"}, {"Title":"Joomla! Component com_shop - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36222"}, {"Title":"Joomla! Component com_shop - SQL Injection","URL":"https://www.exploit-db.com/exploits/35797"}, {"Title":"Joomla! Component com_siirler 1.2 - 'sid' SQL Injection","URL":"https://www.exploit-db.com/exploits/9510"}, {"Title":"Joomla! Component com_simplefaq - 'catid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11294"}, {"Title":"Joomla! Component com_simpleimageupload - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37364"}, {"Title":"Joomla! Component com_simplephotogallery 1.0 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/36373"}, {"Title":"Joomla! Component com_simplephotogallery 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/36385"}, {"Title":"Joomla! Component com_SimpleShop - SQL Injection","URL":"https://www.exploit-db.com/exploits/14501"}, {"Title":"Joomla! Component com_simpleswfupload - 'uploadhandler.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37378"}, {"Title":"Joomla! Component com_slideshow - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4440"}, {"Title":"Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections","URL":"https://www.exploit-db.com/exploits/17530"}, {"Title":"Joomla! Component com_software - SQL Injection","URL":"https://www.exploit-db.com/exploits/11868"}, {"Title":"Joomla! Component com_solution - SQL Injection","URL":"https://www.exploit-db.com/exploits/11908"}, {"Title":"Joomla! Component com_some - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/36596"}, {"Title":"Joomla! Component com_spain - 'nv' SQL Injection","URL":"https://www.exploit-db.com/exploits/34684"}, {"Title":"Joomla! Component com_spa - SQL Injection (1)","URL":"https://www.exploit-db.com/exploits/14423"}, {"Title":"Joomla! Component com_spa - SQL Injection (2)","URL":"https://www.exploit-db.com/exploits/14394"}, {"Title":"Joomla! Component com_spec - SQL Injection","URL":"https://www.exploit-db.com/exploits/11939"}, {"Title":"Joomla! Component com_spielothek 1.6.9 - Multiple Blind SQL Injections","URL":"https://www.exploit-db.com/exploits/14518"}, {"Title":"Joomla! Component com_spsnewsletter - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12149"}, {"Title":"Joomla! Component com_start - SQL Injection","URL":"https://www.exploit-db.com/exploits/11696"}, {"Title":"Joomla! Component com_storedirectory - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/35026"}, {"Title":"Joomla! Component com_surveymanager 1.5.0 - 'stype' SQL Injection","URL":"https://www.exploit-db.com/exploits/9721"}, {"Title":"Joomla! Component com_szallasok - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/37443"}, {"Title":"Joomla! Component com_tag - 'tag' SQL Injection","URL":"https://www.exploit-db.com/exploits/22098"}, {"Title":"Joomla! Component com_tariff - SQL Injection","URL":"https://www.exploit-db.com/exploits/11915"}, {"Title":"Joomla! Component com_tax - 'eid' SQL Injection","URL":"https://www.exploit-db.com/exploits/34708"}, {"Title":"Joomla! Component com_teacher - SQL Injection","URL":"https://www.exploit-db.com/exploits/11917"}, {"Title":"Joomla! Component com_team - SQL Injection","URL":"https://www.exploit-db.com/exploits/17412"}, {"Title":"Joomla! Component com_television - SQL Injection","URL":"https://www.exploit-db.com/exploits/11940"}, {"Title":"Joomla! Component com_ticketbook - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12143"}, {"Title":"Joomla! Component com_tickets 2.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/8999"}, {"Title":"Joomla! Component com_tienda - 'categoria' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33509"}, {"Title":"Joomla! Component com_tophotelmodule 1.0 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7539"}, {"Title":"Joomla! Component com_topmenu - SQL Injection","URL":"https://www.exploit-db.com/exploits/11919"}, {"Title":"Joomla! Component com_tour - SQL Injection","URL":"https://www.exploit-db.com/exploits/11991"}, {"Title":"Joomla! Component com_tpjobs - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10950"}, {"Title":"Joomla! Component com_trabalhe_conosco - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/10740"}, {"Title":"Joomla! Component com_trading - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11992"}, {"Title":"Joomla! Component com_tree - 'key' SQL Injection","URL":"https://www.exploit-db.com/exploits/36220"}, {"Title":"Joomla! Component com_tsonymf - 'idofitem' SQL Injection","URL":"https://www.exploit-db.com/exploits/36469"}, {"Title":"Joomla! Component com_units - SQL Injection","URL":"https://www.exploit-db.com/exploits/11924"}, {"Title":"Joomla! Component com_universal - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/11865"}, {"Title":"Joomla! Component com_user - 'view' Open Redirection","URL":"https://www.exploit-db.com/exploits/33122"}, {"Title":"Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/8920"}, {"Title":"Joomla! Component com_versioning - SQL Injection","URL":"https://www.exploit-db.com/exploits/17264"}, {"Title":"Joomla! Component com_videogallerylite 1.0.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/40413"}, {"Title":"Joomla! Component com_videogallery - Local File Inclusion / SQL Injection","URL":"https://www.exploit-db.com/exploits/37102"}, {"Title":"Joomla! Component com_videos - SQL Injection","URL":"https://www.exploit-db.com/exploits/11449"}, {"Title":"Joomla! Component com_virtualmoney 1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/35984"}, {"Title":"Joomla! Component com_virtuemart 1.0 - 'Product_ID' SQL Injection","URL":"https://www.exploit-db.com/exploits/10407"}, {"Title":"Joomla! Component com_virtuemart 1.1.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/35293"}, {"Title":"Joomla! Component com_virtuemart 1.1.7/1.5 - Blind SQL Injection (Metasploit)","URL":"https://www.exploit-db.com/exploits/17579"}, {"Title":"Joomla! Component com_virtuemart 1.1.7 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/17132"}, {"Title":"Joomla! Component com_virtuemart 2.0.22a - SQL Injection","URL":"https://www.exploit-db.com/exploits/27879"}, {"Title":"Joomla! Component com_virtuemart - order_status_id SQL Injection","URL":"https://www.exploit-db.com/exploits/11271"}, {"Title":"Joomla! Component com_visa - Local File Inclusion / SQL Injection","URL":"https://www.exploit-db.com/exploits/36634"}, {"Title":"Joomla! Component com_voj - SQL Injection","URL":"https://www.exploit-db.com/exploits/35929"}, {"Title":"Joomla! Component com_vxdate - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/11790"}, {"Title":"Joomla! Component com_wallpapers - SQL Injection","URL":"https://www.exploit-db.com/exploits/11867"}, {"Title":"Joomla! Component com_waticketsystem - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7833"}, {"Title":"Joomla! Component com_webeecomment 2.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12111"}, {"Title":"Joomla! Component com_weblinks - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33812"}, {"Title":"Joomla! Component com_wgpicasa - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12230"}, {"Title":"Joomla! Component com_wire_immogest - 'index.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/39098"}, {"Title":"Joomla! Component com_wisroyq 1.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12056"}, {"Title":"Joomla! Component com_wmtpic 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14128"}, {"Title":"Joomla! Component com_worldrates - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12180"}, {"Title":"Joomla! Component com_xball - 'team_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36593"}, {"Title":"Joomla! Component com_xcloner-backupandrestore - Remote Command Execution","URL":"https://www.exploit-db.com/exploits/16246"}, {"Title":"Joomla! Component com_xcomp - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/36835"}, {"Title":"Joomla! Component com_xeslidegalfx - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36012"}, {"Title":"Joomla! Component com_xevidmegahd - SQL Injection","URL":"https://www.exploit-db.com/exploits/7716"}, {"Title":"Joomla! Component com_xgallery 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15801"}, {"Title":"Joomla! Component com_xmap 1.2.11 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/17525"}, {"Title":"Joomla! Component com_xmovie 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15819"}, {"Title":"Joomla! Component com_x-shop - 'idd' SQL Injection","URL":"https://www.exploit-db.com/exploits/36834"}, {"Title":"Joomla! Component com_xvs - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/36856"}, {"Title":"Joomla! Component com_yanc - SQL Injection","URL":"https://www.exploit-db.com/exploits/11603"}, {"Title":"Joomla! Component com_ybggal 1.0 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/13979"}, {"Title":"Joomla! Component com_yellowpages - SQL Injection","URL":"https://www.exploit-db.com/exploits/14592"}, {"Title":"Joomla! Component com_yjcontactus - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/18033"}, {"Title":"Joomla! Component com_zcalendar - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10548"}, {"Title":"Joomla! Component com_zina - SQL Injection","URL":"https://www.exploit-db.com/exploits/14702"}, {"Title":"Joomla! Component com_zoomportfolio - SQL Injection","URL":"https://www.exploit-db.com/exploits/14718"}, {"Title":"Joomla! Component comztautolink - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/38134"}, {"Title":"Joomla! Component Contact Form Maker 1.0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/36561"}, {"Title":"Joomla! Component Contact Info 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7093"}, {"Title":"Joomla! Component Content 1.0.0 - 'itemID' SQL Injection","URL":"https://www.exploit-db.com/exploits/6025"}, {"Title":"Joomla! Component Content 1.5 RC3 - 'view' SQL Injection","URL":"https://www.exploit-db.com/exploits/30848"}, {"Title":"Joomla! Component Content ConstructionKit 1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41507"}, {"Title":"Joomla! Component ContentMap 1.3.8 - 'contentid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41427"}, {"Title":"Joomla! Component Content - 'year' SQL Injection","URL":"https://www.exploit-db.com/exploits/36302"}, {"Title":"Joomla! Component Controller - 'Itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/35960"}, {"Title":"Joomla! Component Cookex Agency CKForms - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15453"}, {"Title":"Joomla! Component Core 1.5.x com - Denial of Service","URL":"https://www.exploit-db.com/exploits/10820"}, {"Title":"Joomla! Component Coupon 3.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41500"}, {"Title":"Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/43932"}, {"Title":"Joomla! Component Currency Converter 1.0.0 - 'from' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/36659"}, {"Title":"Joomla! Component custompages 1.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/5294"}, {"Title":"Joomla! Component CV Maker 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12172"}, {"Title":"Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/45447"}, {"Title":"Joomla! Component CW Tags 2.0.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44158"}, {"Title":"Joomla! Component d3000 1.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5299"}, {"Title":"Joomla! Component D4JeZine 2.8 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/3590"}, {"Title":"Joomla! Component Dada Mail Manager 2.6 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/7002"}, {"Title":"Joomla! Component Daily Message 1.0.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/6802"}, {"Title":"Joomla! Component Datsogallery 1.6 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5583"}, {"Title":"Joomla! Component DBQuery 1.4.1.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/6003"}, {"Title":"Joomla! Component dcsFlashGames 2.0RC1 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/11884"}, {"Title":"Joomla! Component Delicious Bookmarks 0.0.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12237"}, {"Title":"Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12238"}, {"Title":"Joomla! Component DentroVideo 1.2 - 'upload.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37380"}, {"Title":"Joomla! Component Digital Diary 1.5.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12178"}, {"Title":"Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41409"}, {"Title":"Joomla! Component DJ-ArtGallery 0.9.1 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/13737"}, {"Title":"Joomla! Component dj-classifieds 2.0 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/25248"}, {"Title":"Joomla! Component Djice Shoutbox 1.0 - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/8197"}, {"Title":"Joomla! Component DM Orders - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33474"}, {"Title":"Joomla! Component ds-syndicate - 'feed_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/6792"}, {"Title":"Joomla! Component DT Register 3.2.7 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/44108"}, {"Title":"Joomla! Component DT Register - 'cat' SQL Injection","URL":"https://www.exploit-db.com/exploits/40912"}, {"Title":"Joomla! Component DT Register - SQL Injection","URL":"https://www.exploit-db.com/exploits/6086"}, {"Title":"Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection","URL":"https://www.exploit-db.com/exploits/45462"}, {"Title":"Joomla! Component DW Graph - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11978"}, {"Title":"Joomla! Component EasyBlog - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/14336"}, {"Title":"Joomla! Component EasyBook 1.1 - 'gbid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5740"}, {"Title":"Joomla! Component EasyBook 2.0.0rc4 - Multiple HTML Injection Vulnerabilities","URL":"https://www.exploit-db.com/exploits/33639"}, {"Title":"Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/43488"}, {"Title":"Joomla! Component Easy Flash Uploader - 'helper.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37383"}, {"Title":"Joomla! Component Easy Shop 1.2.3 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/46219"}, {"Title":"Joomla! Component Easy Youtube Gallery 1.0.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/39590"}, {"Title":"Joomla! Component ECommerce-WD 1.2.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/36439"}, {"Title":"Joomla! Component EContent - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11996"}, {"Title":"Joomla! Component education - SQL Injection","URL":"https://www.exploit-db.com/exploits/12153"}, {"Title":"Joomla! Component EkRishta 2.10 - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/44869"}, {"Title":"Joomla! Component EkRishta 2.10 - Cross-Site Scripting / SQL Injection","URL":"https://www.exploit-db.com/exploits/44660"}, {"Title":"Joomla Component Ek Rishta 2.10 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44893"}, {"Title":"Joomla! Component EkRishta 2.10 - 'username' SQL Injection","URL":"https://www.exploit-db.com/exploits/44877"}, {"Title":"Joomla! Component Ek Rishta 2.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44161"}, {"Title":"Joomla! Component ElearningForce Flash Magazine Deluxe - SQL Injection","URL":"https://www.exploit-db.com/exploits/7881"}, {"Title":"Joomla! Component Elite Experts - SQL Injection","URL":"https://www.exploit-db.com/exploits/15100"}, {"Title":"Joomla! Component equotes 0.9.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5723"}, {"Title":"Joomla! Component EShop 2.5.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41387"}, {"Title":"Joomla! Component Estate Agent - SQL Injection","URL":"https://www.exploit-db.com/exploits/18728"}, {"Title":"Joomla! Component Event Booking 2.10.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/40423"}, {"Title":"Joomla! Component eventCal 1.6.4 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14187"}, {"Title":"Joomla! Component Eventix Events Calendar 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41407"}, {"Title":"Joomla! Component EventList 0.8 - 'did' SQL Injection","URL":"https://www.exploit-db.com/exploits/4309"}, {"Title":"Joomla! Component Event Manager - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/10549"}, {"Title":"Joomla! Component Event Registration Pro Calendar 4.1.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42416"}, {"Title":"Joomla! Component Expose RC35 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/4194"}, {"Title":"Joomla! Component EXP Shop 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/31947"}, {"Title":"Joomla! Component EXP Shop - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5893"}, {"Title":"Joomla! Component Extra Search 2.2.8 - 'establename' SQL Injection","URL":"https://www.exploit-db.com/exploits/41663"}, {"Title":"Joomla Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/45472"}, {"Title":"Joomla! Component EZ Store Remote - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/6199"}, {"Title":"Joomla! Component Fabrik 2.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12087"}, {"Title":"Joomla! Component Fabrik - SQL Injection","URL":"https://www.exploit-db.com/exploits/14707"}, {"Title":"Joomla! Component FacileForms 1.4.4 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/5915"}, {"Title":"Joomla! Component FacileForms - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/10737"}, {"Title":"Joomla! Component Fantasytournament - SQL Injection","URL":"https://www.exploit-db.com/exploits/7777"}, {"Title":"Joomla! Component Fastball 1.1.0 < 1.2 - 'league' SQL Injection","URL":"https://www.exploit-db.com/exploits/9822"}, {"Title":"Joomla! Component Fastball 2.5 - 'season' SQL Injection","URL":"https://www.exploit-db.com/exploits/44109"}, {"Title":"Joomla! Component F!BB 1.5.96 RC - SQL Injection / HTML Injection","URL":"https://www.exploit-db.com/exploits/33641"}, {"Title":"Joomla! Component FDione Form Wizard 1.0.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12595"}, {"Title":"Joomla! Component Feederator 1.0.5 - Multiple Remote File Inclusions","URL":"https://www.exploit-db.com/exploits/7040"}, {"Title":"Joomla Component Fields - SQLi Remote Code Execution (Metasploit)","URL":"https://www.exploit-db.com/exploits/44358"}, {"Title":"Joomla! Component File Download Tracker 3.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44110"}, {"Title":"Joomla! Component Filiale 1.0.4 - 'idFiliale' SQL Injection","URL":"https://www.exploit-db.com/exploits/5488"}, {"Title":"Joomla! Component flash fun! 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4415"}, {"Title":"Joomla! Component FlashGames 1.5.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12169"}, {"Title":"Joomla! Component Flash Image Gallery - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4496"}, {"Title":"Joomla! Component Flash Tree Gallery 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/6928"}, {"Title":"Joomla! Component Flash Uploader 2.5.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4521"}, {"Title":"Joomla! Component FLEXIcontent 1.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12185"}, {"Title":"Joomla! Component FlippingBook 1.0.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5484"}, {"Title":"Joomla! Component Flip Wall 8.0 - 'wallid' SQL Injection","URL":"https://www.exploit-db.com/exploits/42524"}, {"Title":"Joomla! Component FocalPoint 1.2.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42530"}, {"Title":"Joomla! Component Foobla Suggestions 1.5.1.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12120"}, {"Title":"Joomla! Component Form Maker 3.6.12 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44111"}, {"Title":"Joomla! Component Foto - 'id_categoria' SQL Injection","URL":"https://www.exploit-db.com/exploits/35956"}, {"Title":"Joomla! Component Freestyle FAQ Lite 1.3 - 'faqid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12078"}, {"Title":"Joomla! Component FreiChat 1.0/2.x - HTML Injection","URL":"https://www.exploit-db.com/exploits/34374"}, {"Title":"Joomla! Component Front-End Article Manager System - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/14209"}, {"Title":"Joomla! Component Full - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/36591"}, {"Title":"Joomla! Component Full Social 1.1.0 - 'search_query' SQL Injection","URL":"https://www.exploit-db.com/exploits/44786"}, {"Title":"Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12285"}, {"Title":"Joomla! Component Gallery WD 1.3.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44112"}, {"Title":"Joomla! Component Gallery XML 1.1 - SQL Injection / Local File Inclusion","URL":"https://www.exploit-db.com/exploits/34159"}, {"Title":"Joomla! Component GameQ 4.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5752"}, {"Title":"Joomla! Component Gamesbox 1.0.2 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/14126"}, {"Title":"Joomla! Component Gantry 3.0.10 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14911"}, {"Title":"Joomla! Component GBU Facebook 1.0.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12299"}, {"Title":"Joomla! Component Gift Exchange com_giftexchange 1.0 Beta - 'pkg' SQL Injection","URL":"https://www.exploit-db.com/exploits/11815"}, {"Title":"Joomla! Component Gigcal 1.x - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/7815"}, {"Title":"Joomla! Component gigCalendar 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7746"}, {"Title":"Joomla! Component Gnosis 1.1.2 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41460"}, {"Title":"Joomla! Component Golf Course Guide 0.9.6.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14448"}, {"Title":"Joomla! Component Google Map Landkarten 4.2.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44113"}, {"Title":"Joomla! Component Google Map Store Locator 4.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41391"}, {"Title":"Joomla! Component GPS Tools 4.0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41450"}, {"Title":"Joomla! Component Graphics 1.0.6 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12430"}, {"Title":"Joomla! Component Groovy Gallery 1.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41380"}, {"Title":"Joomla! Component GroupJive 1.8 B4 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/9840"}, {"Title":"Joomla! Component Guesser 1.0.4 - 'type' SQL Injection","URL":"https://www.exploit-db.com/exploits/41495"}, {"Title":"Joomla! Component Guru Pro - 'Itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/40111"}, {"Title":"Joomla! Component Guru Pro - 'promocode' SQL Injection","URL":"https://www.exploit-db.com/exploits/43351"}, {"Title":"Joomla! Component Hbooking 1.9.9 - 'h_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41340"}, {"Title":"Joomla! Component HD FLV Player - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33673"}, {"Title":"Joomla! Component healthstats - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/14335"}, {"Title":"Joomla! Component Helpdesk Pro < 1.4.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/37666"}, {"Title":"Joomla! Component Highslide 1.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12086"}, {"Title":"Joomla! Component Highwood Design hwdVideoShare - SQL Injection","URL":"https://www.exploit-db.com/exploits/5160"}, {"Title":"Joomla! Component HM Community - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/18050"}, {"Title":"Joomla! Component Horoscope 1.5.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12167"}, {"Title":"Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection","URL":"https://www.exploit-db.com/exploits/9648"}, {"Title":"Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42597"}, {"Title":"Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42598"}, {"Title":"Joomla! Component Huge-IT Video Gallery 1.0.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42596"}, {"Title":"Joomla! Component Huru Helpdesk - SQL Injection (1)","URL":"https://www.exploit-db.com/exploits/12124"}, {"Title":"Joomla! Component Huru Helpdesk - SQL Injection (2)","URL":"https://www.exploit-db.com/exploits/14449"}, {"Title":"Joomla! Component hwdVideoShare - 'flash_upload.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37410"}, {"Title":"Joomla! Component Ice Gallery 0.5b2 - 'catid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7572"}, {"Title":"Joomla! Component idoblog 1.1b30 (com_idoblog) - SQL Injection","URL":"https://www.exploit-db.com/exploits/9413"}, {"Title":"Joomla! Component iDoBlog b24 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5730"}, {"Title":"Joomla! Component IDoEditor - 'image.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37381"}, {"Title":"Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/33440"}, {"Title":"Joomla! Component iF surfALERT 1.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12291"}, {"Title":"Joomla! Component Ignite Gallery 0.8.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/6723"}, {"Title":"Joomla! Component iJoomla! com_magazine - 'pageid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31247"}, {"Title":"Joomla! Component iJoomla Magazine 3.0.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/14896"}, {"Title":"Joomla! Component iJoomla News Portal 1.0 - 'itemID' SQL Injection","URL":"https://www.exploit-db.com/exploits/5761"}, {"Title":"Joomla! Component imagebrowser 0.1.5 rc2 - Directory Traversal","URL":"https://www.exploit-db.com/exploits/6618"}, {"Title":"Joomla! Component iNetLanka Contact Us Draw Root Map 1.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12289"}, {"Title":"Joomla! Component iNetLanka Multiple Map 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12288"}, {"Title":"Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12287"}, {"Title":"Joomla! Component Inneradmission - 'index.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/39140"}, {"Title":"Joomla! Component Intellectual Property 1.5.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/12246"}, {"Title":"Joomla! Component Intranet Attendance Track 2.6.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41456"}, {"Title":"Joomla! Component InviteX 3.0.5 - 'invite_type' SQL Injection","URL":"https://www.exploit-db.com/exploits/44114"}, {"Title":"Joomla! Component ionFiles 4.4.2 - File Disclosure","URL":"https://www.exploit-db.com/exploits/6809"}, {"Title":"Joomla! Component IRCm Basic - SQL Injection","URL":"https://www.exploit-db.com/exploits/9812"}, {"Title":"Joomla! Component is 1.0.1 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/5995"}, {"Title":"Joomla! Component IXXO Cart - SQL Injection","URL":"https://www.exploit-db.com/exploits/14291"}, {"Title":"Joomla! Component IXXO Cart! Standalone and - SQL Injection","URL":"https://www.exploit-db.com/exploits/9276"}, {"Title":"Joomla! Component J2Store < 3.3.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46467"}, {"Title":"Joomla! Component jabode - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5963"}, {"Title":"Joomla! Component JA Comment - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12236"}, {"Title":"Joomla! Component JA T3 Framework - Directory Traversal","URL":"https://www.exploit-db.com/exploits/37090"}, {"Title":"Joomla! Component JA Voice 2.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12121"}, {"Title":"Joomla! Component JB Bus 2.3 - 'order_number' SQL Injection","URL":"https://www.exploit-db.com/exploits/44115"}, {"Title":"Joomla! Component JBDiary - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11239"}, {"Title":"Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection","URL":"https://www.exploit-db.com/exploits/43323"}, {"Title":"Joomla! Component J-BusinessDirectory 4.6.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41411"}, {"Title":"Joomla! Component J-BusinessDirectory 4.9.7 - 'type' SQL Injection","URL":"https://www.exploit-db.com/exploits/46230"}, {"Title":"Joomla! Component JB Visa 1.0 - 'visatype' SQL Injection","URL":"https://www.exploit-db.com/exploits/43350"}, {"Title":"Joomla! Component JCal Pro Calendar - SQL Injection","URL":"https://www.exploit-db.com/exploits/37413"}, {"Title":"Joomla! Component jCart for OpenCart 2.0 - 'product_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41642"}, {"Title":"Joomla! Component jCart for OpenCart 2.3.0.2 - Cross-Site Request Forgery","URL":"https://www.exploit-db.com/exploits/44788"}, {"Title":"Joomla Component JCK Editor 6.4.4 - 'parent' SQL Injection","URL":"https://www.exploit-db.com/exploits/45423"}, {"Title":"Joomla! Component J-ClassifiedsManager 3.0.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46231"}, {"Title":"Joomla! Component JComments 2.1 - 'ComntrNam' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33998"}, {"Title":"Joomla! Component JContentSubscription 1.5.8 - Multiple Remote File Inclusions","URL":"https://www.exploit-db.com/exploits/4508"}, {"Title":"Joomla! Component J-CruisePortal 6.0.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46233"}, {"Title":"Joomla! Component J-CruiseReservation Standard 3.0 - 'city' SQL Injection","URL":"https://www.exploit-db.com/exploits/41406"}, {"Title":"Joomla! Component jDownloads 1.0 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/17303"}, {"Title":"Joomla! Component jDownloads 3.2.58 - Cross Site Scripting","URL":"https://www.exploit-db.com/exploits/44471"}, {"Title":"Joomla! Component JD-Wiki 1.0.2 - 'dwpage.php?MosConfig_absolute_path' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/30157"}, {"Title":"Joomla! Component JD-Wiki 1.0.2 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2125"}, {"Title":"Joomla! Component JD-Wiki 1.0.2 - 'wantedpages.php?MosConfig_absolute_path' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/30158"}, {"Title":"Joomla! Component JE Ajax Event Calendar 1.0.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/13997"}, {"Title":"Joomla! Component JE Ajax Event Calendar - SQL Injection","URL":"https://www.exploit-db.com/exploits/15610"}, {"Title":"Joomla! Component JE auction 1.6 - 'eid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41337"}, {"Title":"Joomla! Component JE Auto 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/15714"}, {"Title":"Joomla! Component JE Auto 1.5 - 'd_itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41338"}, {"Title":"Joomla! Component JE Auto - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15779"}, {"Title":"Joomla! Component JE Awd Song 1.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41339"}, {"Title":"Joomla! Component JE Awd Song - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/14059"}, {"Title":"Joomla! Component JE Classify Ads 1.2 - 'pro_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41330"}, {"Title":"Joomla! Component JE Directory 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/15163"}, {"Title":"Joomla! Component JE Directory 1.7 - 'ditemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41332"}, {"Title":"Joomla! Component jeeventcalendar - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14062"}, {"Title":"Joomla! Component JE Event Calendar - SQL Injection","URL":"https://www.exploit-db.com/exploits/11292"}, {"Title":"Joomla! Component JE FAQ Pro 1.5.0 - Multiple Blind SQL Injections","URL":"https://www.exploit-db.com/exploits/14846"}, {"Title":"Joomla! Component JE Form Creator 1.8 - 'Itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41344"}, {"Title":"Joomla! Component Jeformcr - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/35089"}, {"Title":"Joomla! Component JE Gallery 1.3 - 'photo_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41331"}, {"Title":"Joomla! Component JE Grid Folio - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41342"}, {"Title":"Joomla! Component JE Guestbook 1.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/15157"}, {"Title":"Joomla! Component JE Job 1.0 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12782"}, {"Title":"Joomla! Component JE Job 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12601"}, {"Title":"Joomla! Component JE Job - SQL Injection","URL":"https://www.exploit-db.com/exploits/15162"}, {"Title":"Joomla! Component JE K2 Multiple Form Story 1.3 - 'Itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41343"}, {"Title":"Joomla! Component JEmbedAll 1.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41378"}, {"Title":"Joomla! Component JE Media Player - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14060"}, {"Title":"Joomla! Component JE Messanger - SQL Injection","URL":"https://www.exploit-db.com/exploits/41347"}, {"Title":"Joomla! Component JE Messenger 1.0 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/15719"}, {"Title":"Joomla! Component JE PayperVideo 3.0.0 - 'usr_plan' SQL Injection","URL":"https://www.exploit-db.com/exploits/43948"}, {"Title":"Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection","URL":"https://www.exploit-db.com/exploits/45930"}, {"Title":"Joomla! Component JE Poll - 'pollid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12781"}, {"Title":"Joomla! Component JE Portfolio Creator 1.2 - 'd_itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41345"}, {"Title":"Joomla! Component JE Property Finder 1.6.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41334"}, {"Title":"Joomla! Component JE Quiz 2.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41341"}, {"Title":"Joomla! Component JE Quiz - 'eid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11287"}, {"Title":"Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12607"}, {"Title":"Joomla! Component JE QuoteForm - 'Itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41333"}, {"Title":"Joomla! Component jesectionfinder - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14064"}, {"Title":"Joomla! Component JE Story Submit - 'index.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/36624"}, {"Title":"Joomla! Component JE Story Submit - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/17556"}, {"Title":"Joomla! Component jesubmit 1.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14054"}, {"Title":"Joomla! Component JE Ticket System 1.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41346"}, {"Title":"Joomla! Component JE Tour 2.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41335"}, {"Title":"Joomla! Component JE Video Rate 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41336"}, {"Title":"Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/35090"}, {"Title":"Joomla! Component JEXTN Classified 1.0.0 - 'sid' SQL Injection","URL":"https://www.exploit-db.com/exploits/43957"}, {"Title":"Joomla! Component JEXTN FAQ Pro 4.0.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/43393"}, {"Title":"Joomla! Component JEXTN Membership 3.1.0 - 'usr_plan' SQL Injection","URL":"https://www.exploit-db.com/exploits/43940"}, {"Title":"Joomla! Component JEXTN Question And Answer 3.1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/43329"}, {"Title":"Joomla! Component JEXTN Reverse Auction 3.1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/43950"}, {"Title":"Joomla! Component JEXTN Video Gallery 3.0.5 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/43330"}, {"Title":"Joomla! Component Jfeedback 1.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12145"}, {"Title":"Joomla! Component JForJoomla! Jreservation 1.5 - 'pid' SQL Injection","URL":"https://www.exploit-db.com/exploits/10016"}, {"Title":"Joomla! Component JGen 0.9.33 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14998"}, {"Title":"Joomla! Component jGive 2.0.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44116"}, {"Title":"Joomla! Component J-HotelPortal 6.0.2 - 'review_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41405"}, {"Title":"Joomla! Component JHotelReservation 6.0.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46234"}, {"Title":"Joomla! Component JiFile 2.3.1 - Arbitrary File Download","URL":"https://www.exploit-db.com/exploits/46774"}, {"Title":"Joomla! Component Jimtawl 1.0.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15585"}, {"Title":"Joomla! Component Jimtawl 2.1.6 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/43958"}, {"Title":"Joomla! Component Jimtawl 2.2.7 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/45524"}, {"Title":"Joomla! Component JInventory 1.23.02 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12065"}, {"Title":"Joomla! Component jLike 1.0 - Information Leak","URL":"https://www.exploit-db.com/exploits/43977"}, {"Title":"Joomla! Component JMovies 1.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/7331"}, {"Title":"Joomla! Component JMS Music 1.1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/43959"}, {"Title":"Joomla! Component JMultipleHotelReservation 6.0.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46232"}, {"Title":"Joomla! Component J-MultipleHotelReservation Standard 6.0.2 - 'review_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41408"}, {"Title":"Joomla! Component Joaktree 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/10272"}, {"Title":"Joomla! Component Jobads - 'type' SQL Injection","URL":"https://www.exploit-db.com/exploits/33478"}, {"Title":"Joomla! Component Jobline 1.3.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9187"}, {"Title":"Joomla! Component Jobs Factory 2.0.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45469"}, {"Title":"Joomla! Component Job - SQL Injection","URL":"https://www.exploit-db.com/exploits/11307"}, {"Title":"Joomla! Component JO Facebook Gallery 4.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41445"}, {"Title":"Joomla! Component JoltCard 1.2.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12269"}, {"Title":"Joomla! Component JomEstate PRO 3.7 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/44117"}, {"Title":"Joomla! Component Jomres 9.11.2 - Cross-Site Request Forgery (Add User)","URL":"https://www.exploit-db.com/exploits/44901"}, {"Title":"Joomla! Component JomSocial 1.6.288 - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/13962"}, {"Title":"Joomla! Component JomSocial - SQL Injection","URL":"https://www.exploit-db.com/exploits/41465"}, {"Title":"Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41385"}, {"Title":"Joomla! Component JooBB 0.5.9 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5719"}, {"Title":"Joomla! Component JooBlog 0.1.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5734"}, {"Title":"Joomla! Component JooBlog 0.1.1 - 'PostID' SQL Injection","URL":"https://www.exploit-db.com/exploits/7078"}, {"Title":"Joomla! Component JooCart 2.x - 'product_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41641"}, {"Title":"Joomla! Component JooDatabase 3.1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41444"}, {"Title":"Joomla! Component jooget 2.6.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5132"}, {"Title":"Joomla! Component joom12pic 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4416"}, {"Title":"Joomla! Component Joomanager 2.0.0 - 'com_Joomanager' Arbitrary File Download (PoC)","URL":"https://www.exploit-db.com/exploits/42590"}, {"Title":"Joomla! Component Joomanager 2.0.0 - 'com_Joomanager' Arbitrary File Download","URL":"https://www.exploit-db.com/exploits/44252"}, {"Title":"Joomla! Component Joomanager - SQL Injection","URL":"https://www.exploit-db.com/exploits/14127"}, {"Title":"Joomla! Component JoomBlog 1.3.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41362"}, {"Title":"Joomla! Component JoomCRM 1.1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46122"}, {"Title":"Joomla! Component Joomdle 0.24 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14466"}, {"Title":"Joomla! Component Joomlaboard 1.1.1 - 'sbp' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3560"}, {"Title":"Joomla! Component joomlacontenteditor 2.0.10 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/17734"}, {"Title":"Joomla! Component joomlacontenteditor - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/17136"}, {"Title":"Joomla! Component JoomlaDate 1.2 - 'user' SQL Injection","URL":"https://www.exploit-db.com/exploits/5748"}, {"Title":"Joomla! Component Joomlaequipment (com_juser) 2.0.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/8847"}, {"Title":"Joomla! Component JoomlaFacebook - SQL Injection","URL":"https://www.exploit-db.com/exploits/33238"}, {"Title":"Joomla! Component Joomla Flickr 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12085"}, {"Title":"Joomla! Component JoomlaPack 1.0.4a2 RE - 'CAltInstaller.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3753"}, {"Title":"Joomla! Component Joomlaradio 5.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4401"}, {"Title":"Joomla! Component Joomla-Visites 1.1 RC2 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/5497"}, {"Title":"Joomla! Component JoomlaXi - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/17452"}, {"Title":"Joomla! Component JoomlaXplorer 1.6.2 - Remote s","URL":"https://www.exploit-db.com/exploits/5431"}, {"Title":"Joomla! Component Joomloc 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/9604"}, {"Title":"Joomla! Component Joomloc-CAT 4.1.3 - 'ville' SQL Injection","URL":"https://www.exploit-db.com/exploits/41383"}, {"Title":"Joomla! Component Joomloc-Lite 1.3.2 - 'site_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41384"}, {"Title":"Joomla! Component JoomMail 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12175"}, {"Title":"Joomla! Component JoomOCShop 1.0 - Cross-Site Request Forgery","URL":"https://www.exploit-db.com/exploits/44789"}, {"Title":"Joomla! Component JoomProject 1.1.3.2 - Information Disclosure","URL":"https://www.exploit-db.com/exploits/46121"}, {"Title":"Joomla! Component JoomRadio 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5729"}, {"Title":"Joomla! Component JoomRadio 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12400"}, {"Title":"Joomla! Component JoomRecipe 1.0.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42185"}, {"Title":"Joomla! Component JoomRecipe 1.0.4 - 'search_author' SQL Injection","URL":"https://www.exploit-db.com/exploits/42347"}, {"Title":"Joomla! Component Joomsport - SQL Injection / Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37375"}, {"Title":"Joomla! Component JoomTouch 1.0.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/17674"}, {"Title":"Joomla! Component Joomtracker 1.01 - SQL Injection","URL":"https://www.exploit-db.com/exploits/6709"}, {"Title":"Joomla! Component Joomulus 2.0 - 'tagcloud.swf' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33441"}, {"Title":"Joomla! Component Joostina - SQL Injection","URL":"https://www.exploit-db.com/exploits/15085"}, {"Title":"Joomla! Component joovideo 1.2.2 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5277"}, {"Title":"Joomla! Component Jotloader 1.2.1.a - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5737"}, {"Title":"Joomla! Component JotLoader 2.2.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15791"}, {"Title":"Joomla! Component JPad 1.0 - (Authenticated) SQL Injection","URL":"https://www.exploit-db.com/exploits/5493"}, {"Title":"Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14964"}, {"Title":"Joomla! Component JP Jobs 1.2.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/12191"}, {"Title":"Joomla! Component JP Jobs 1.4.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12037"}, {"Title":"Joomla! Component JPodium 2.7.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14232"}, {"Title":"Joomla! Component JProject Manager 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12146"}, {"Title":"Joomla! Component JQuarks4s 1.0.0 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/15466"}, {"Title":"Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44118"}, {"Title":"Joomla! Component JRadio - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15749"}, {"Title":"Joomla! Component Jreservation 1.5 - SQL Injection / Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/13794"}, {"Title":"Joomla! Component Jreservation - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11286"}, {"Title":"Joomla! Component JS Autoz 1.0.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44119"}, {"Title":"Joomla! Component JS Calendar 1.5.1 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/15224"}, {"Title":"Joomla! Component Jshop - SQL Injection","URL":"https://www.exploit-db.com/exploits/9891"}, {"Title":"Joomla! Component JS Jobs 1.0.5.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12822"}, {"Title":"Joomla! Component JS Jobs 1.1.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44120"}, {"Title":"Joomla! Component JS Jobs 1.2.0 - Cross-Site Request Forgery","URL":"https://www.exploit-db.com/exploits/44492"}, {"Title":"Joomla! Component JS Jobs 1.2.0 - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/44401"}, {"Title":"Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/47232"}, {"Title":"Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'customfields.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/47249"}, {"Title":"Joomla! Component JSP Store Locator 2.2 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41368"}, {"Title":"Joomla! Component JSP Tickets 1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/43978"}, {"Title":"Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery","URL":"https://www.exploit-db.com/exploits/43912"}, {"Title":"Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion","URL":"https://www.exploit-db.com/exploits/47223"}, {"Title":"Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/47222"}, {"Title":"Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - Arbitrary File Download","URL":"https://www.exploit-db.com/exploits/47216"}, {"Title":"Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/47218"}, {"Title":"Joomla! Component Jstore - 'Controller' Local File Inclusion","URL":"https://www.exploit-db.com/exploits/34837"}, {"Title":"Joomla! Component JSupport 1.5.6 - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/15501"}, {"Title":"Joomla! Component JSupport 1.5.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/15502"}, {"Title":"Joomla! Component JTAG Calendar 6.2.4 - 'search' SQL Injection","URL":"https://www.exploit-db.com/exploits/41209"}, {"Title":"Joomla! Component Jtag Members Directory 5.3.7 - Arbitrary File Download","URL":"https://www.exploit-db.com/exploits/43913"}, {"Title":"Joomla! Component JTicketing 2.0.16 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44121"}, {"Title":"Joomla! Component JTM Reseller 1.9 Beta - SQL Injection","URL":"https://www.exploit-db.com/exploits/12306"}, {"Title":"Joomla! Component Juicy Gallery - 'picId' SQL Injection","URL":"https://www.exploit-db.com/exploits/35958"}, {"Title":"Joomla! Component Juke Box 1.7 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12084"}, {"Title":"Joomla! Component Jumi - 'fileid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8968"}, {"Title":"Joomla! Component juser 1.0.14 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4636"}, {"Title":"Joomla! Component JUX EventOn 1.0.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41504"}, {"Title":"Joomla! Component JV Comment 3.0.2 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31175"}, {"Title":"Joomla! Component Jvehicles 1.0/2.0 - 'aid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12190"}, {"Title":"Joomla! Component Jvehicles - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11997"}, {"Title":"Joomla! Component JVideo 0.3.x - SQL Injection","URL":"https://www.exploit-db.com/exploits/8821"}, {"Title":"Joomla! Component JVideoClip 1.5.1 - 'uid' SQL Injection","URL":"https://www.exploit-db.com/exploits/38777"}, {"Title":"Joomla! Component jVideoDirect - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11280"}, {"Title":"Joomla! Component Jw_allVideos - Arbitrary File Download","URL":"https://www.exploit-db.com/exploits/11447"}, {"Title":"Joomla! Component J!WHMCS Integrator 1.5.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12083"}, {"Title":"Joomla! Component Kbase 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/6827"}, {"Title":"Joomla! Component KissGallery 1.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42494"}, {"Title":"Joomla! Component Kochsuite 0.9.4 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2215"}, {"Title":"Joomla! Component Komento 1.0.0 - 'sid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12590"}, {"Title":"Joomla! Component Komento 1.7.2 - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/31174"}, {"Title":"Joomla! Component Komento - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/37675"}, {"Title":"Joomla! Component Kubik-Rubik Simple Image Gallery Extended (SIGE) 3.2.3 - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/44104"}, {"Title":"Joomla! Component Kunena 3.0.4 - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/32562"}, {"Title":"Joomla! Component Kunena Forums (com_kunena) - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9408"}, {"Title":"Joomla! Component Letterman Subscriber Module 1.2.4 - 'Mod_Lettermansubscribe.php' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/30190"}, {"Title":"Joomla! Component Liga Manager Online 2.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/28302"}, {"Title":"Joomla! Component Link Directory 1.0.3 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2214"}, {"Title":"Joomla! Component live chat - SQL Injection / Open Proxy","URL":"https://www.exploit-db.com/exploits/7441"}, {"Title":"Joomla! Component Live Ticker 1.0 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7573"}, {"Title":"Joomla! Component LMO 1.0b2 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2092"}, {"Title":"Joomla! Component LMS King Professional 3.2.4.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42415"}, {"Title":"Joomla! Component LoginBox - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12068"}, {"Title":"Joomla! Component Love Factory 1.3.4 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12235"}, {"Title":"Joomla! Component Machine - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/36863"}, {"Title":"Joomla! Component mad4Joomla! - SQL Injection","URL":"https://www.exploit-db.com/exploits/6724"}, {"Title":"Joomla! Component Magic Deals Web 1.2.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41410"}, {"Title":"Joomla! Component Magic Updater - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12070"}, {"Title":"Joomla! Component Maian15 - 'name' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/38814"}, {"Title":"Joomla! Component Maian Media - 'uploadhandler.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37412"}, {"Title":"Joomla! Component Maian Music 1.2.1 - 'category' SQL Injection","URL":"https://www.exploit-db.com/exploits/8365"}, {"Title":"Joomla! Component MailTo - 'article' SQL Injection","URL":"https://www.exploit-db.com/exploits/8366"}, {"Title":"Joomla! Component Mamboleto 2.0 RC3 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/10369"}, {"Title":"Joomla! Component Map Locator - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/35788"}, {"Title":"Joomla! Component MaQma Helpdesk 4.2.7 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41399"}, {"Title":"Joomla! Component Matamko 1.01 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12286"}, {"Title":"Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5118"}, {"Title":"Joomla! Component mDigg 2.2.8 - 'category' SQL Injection","URL":"https://www.exploit-db.com/exploits/7574"}, {"Title":"Joomla! Component mDigg 2.2.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/17464"}, {"Title":"Joomla! Component MediaLibrary Basic 3.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41431"}, {"Title":"Joomla! Component MediaLibrary Free 4.0.12 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44122"}, {"Title":"Joomla! Component Media Mall Factory 1.0.4 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/12234"}, {"Title":"Joomla! Component Media Manager - Arbitrary File Upload (Metasploit)","URL":"https://www.exploit-db.com/exploits/27610"}, {"Title":"Joomla! Component mediaslide - 'albumnum' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5120"}, {"Title":"Joomla! Component Memory Book 1.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12176"}, {"Title":"Joomla! Component memorybook 1.2 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/10731"}, {"Title":"Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/45452"}, {"Title":"Joomla! Component Minify4Joomla - Arbitrary File Upload / Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/14293"}, {"Title":"Joomla! Component Minitek FAQ Book 1.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/35839"}, {"Title":"Joomla! Component MisterEstate - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9463"}, {"Title":"Joomla! Component MMS Blog 2.3.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12318"}, {"Title":"Joomla! Component mod_artuploader - 'upload.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37379"}, {"Title":"Joomla! Component Modern Booking 1.0 - 'coupon' SQL Injection","URL":"https://www.exploit-db.com/exploits/41673"}, {"Title":"Joomla! Component mod_jfancy - 'script.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/37382"}, {"Title":"Joomla! Component mod_simpleFileLister 1.0 - Directory Traversal","URL":"https://www.exploit-db.com/exploits/17736"}, {"Title":"Joomla! Component mod_spo - SQL Injection","URL":"https://www.exploit-db.com/exploits/17560"}, {"Title":"Joomla! Component module autostand 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3734"}, {"Title":"Joomla! Component Module Simple File Upload 1.3 - Remote Code Execution","URL":"https://www.exploit-db.com/exploits/18287"}, {"Title":"Joomla! Component mod_VisitorData 1.1 - Remote code Execution","URL":"https://www.exploit-db.com/exploits/12574"}, {"Title":"Joomla! Component MojoBlog 0.15 - Multiple Remote File Inclusions","URL":"https://www.exploit-db.com/exploits/10273"}, {"Title":"Joomla! Component Monthly Archive 3.6.4 - 'author_form' SQL Injection","URL":"https://www.exploit-db.com/exploits/41505"}, {"Title":"Joomla! Component MooFAQ (com_moofaq) - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/8898"}, {"Title":"Joomla! Component mosDirectory 2.3.2 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5047"}, {"Title":"Joomla! Component mosDirectory 2.3.2 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4783"}, {"Title":"Joomla! Component Mosets Tree 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2205"}, {"Title":"Joomla! Component mosmedia 1.0.8 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3714"}, {"Title":"Joomla! Component mosmedialite451 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4499"}, {"Title":"Joomla! Component MosReporter 0.9.3 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2807"}, {"Title":"Joomla! Component Most Wanted Real Estate 1.1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41393"}, {"Title":"Joomla! Component mp3 allopass 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4507"}, {"Title":"Joomla! Component MS Comment 0.8.0b - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12611"}, {"Title":"Joomla! Component MS Comment 0.8.0b - Security Bypass / Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33646"}, {"Title":"Joomla! Component MT Fire Eagle 1.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12233"}, {"Title":"Joomla! Component MultiTier 3.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41442"}, {"Title":"Joomla! Component Multi-Venue Restaurant Menu Manager 1.5.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12159"}, {"Title":"Joomla! Component Music Collection 3.0.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45465"}, {"Title":"Joomla! Component MusicGallery - SQL Injection","URL":"https://www.exploit-db.com/exploits/10250"}, {"Title":"Joomla! Component Music Manager - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/14274"}, {"Title":"Joomla! Component mv_restaurantmenumanager - SQL Injection","URL":"https://www.exploit-db.com/exploits/12162"}, {"Title":"Joomla! Component MyAlbum 1.0 - 'album' SQL Injection","URL":"https://www.exploit-db.com/exploits/5318"}, {"Title":"Joomla! Component My Car 1.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/12779"}, {"Title":"Joomla! Component MyContent 1.1.13 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5714"}, {"Title":"Joomla! Component mydyngallery 1.4.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7343"}, {"Title":"Joomla! Component My Files 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12173"}, {"Title":"Joomla! Component mygallery - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5990"}, {"Title":"Joomla! Component mygallery - 'farbinform_krell' SQL Injection","URL":"https://www.exploit-db.com/exploits/10214"}, {"Title":"Joomla! Component MyHome - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14313"}, {"Title":"Joomla! Component My MSG 3.2.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41463"}, {"Title":"Joomla! Component Myportfolio 3.0.2 - 'pid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41930"}, {"Title":"Joomla! Component My Projects 2.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/43358"}, {"Title":"Joomla! Component MySMS - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/14315"}, {"Title":"Joomla! Component NeoGallery 1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5083"}, {"Title":"Joomla! Component NeoRecruit 1.4 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/4305"}, {"Title":"Joomla! Component NeoRecruit 1.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14570"}, {"Title":"Joomla! Component NeoRecruit 1.6.4 - 'Itemid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14250"}, {"Title":"Joomla! Component NeoRecruit 4.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44123"}, {"Title":"Joomla! Component NeoReferences 1.3.1 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5034"}, {"Title":"Joomla! Component netinvoice 1.2.0 SP1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5939"}, {"Title":"Joomla! Component Newsfeeds - SQL Injection","URL":"https://www.exploit-db.com/exploits/12465"}, {"Title":"Joomla! Component News Portal 1.5.x - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12077"}, {"Title":"Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection","URL":"https://www.exploit-db.com/exploits/43365"}, {"Title":"Joomla! Component n-forms 1.01 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/6055"}, {"Title":"Joomla! Component Nice Talk 0.9.3 - 'tagid' SQL Injection","URL":"https://www.exploit-db.com/exploits/4308"}, {"Title":"Joomla! Component NinjaMonials - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14211"}, {"Title":"Joomla! Component NoticeBoard 1.3 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12427"}, {"Title":"Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/43094"}, {"Title":"Joomla! Component obSuggest - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/17591"}, {"Title":"Joomla! Component Odudeprofile 2.8 - 'profession' SQL Injection","URL":"https://www.exploit-db.com/exploits/37540"}, {"Title":"Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/8870"}, {"Title":"Joomla! Component OneVote! 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41470"}, {"Title":"Joomla! Component ongumatimesheet20 4b - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/6976"}, {"Title":"Joomla! Component onisMusic 2 - 'tag' SQL Injection","URL":"https://www.exploit-db.com/exploits/41324"}, {"Title":"Joomla! Component onisPetitions 2.5 - 'tag' SQL Injection","URL":"https://www.exploit-db.com/exploits/41322"}, {"Title":"Joomla! Component onisQuotes 2.5 - 'tag' SQL Injection","URL":"https://www.exploit-db.com/exploits/41323"}, {"Title":"Joomla! Component Online Exam 1.5.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12174"}, {"Title":"Joomla! Component OnlineFlashQuiz 1.0.2 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/5345"}, {"Title":"Joomla! Component Online Market 2.x - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12177"}, {"Title":"Joomla! Component Online News Paper Manager 1.0 - 'cid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12305"}, {"Title":"Joomla! Component OrgChart 1.0.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12317"}, {"Title":"Joomla! Component OSDownloads 1.7.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42561"}, {"Title":"Joomla! Component OS Property 3.0.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41386"}, {"Title":"Joomla! Component OS Property Real Estate 3.12.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44165"}, {"Title":"Joomla! Component OS Services Booking 2.5.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41388"}, {"Title":"Joomla! Component ownbiblio 1.5.3 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/6730"}, {"Title":"Joomla! Component Ozio Gallery 2 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/13925"}, {"Title":"Joomla! Component Ozio Gallery - SQL Injection","URL":"https://www.exploit-db.com/exploits/14462"}, {"Title":"Joomla! Component panoramic 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4489"}, {"Title":"Joomla! Component Parcoauto - 'idVeicolo' SQL Injection","URL":"https://www.exploit-db.com/exploits/38008"}, {"Title":"Joomla! Component PAX Gallery 0.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/7587"}, {"Title":"Joomla! Component paxxgallery 0.2 - 'gid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5514"}, {"Title":"Joomla! Component paxxgallery 0.2 - 'iid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5117"}, {"Title":"Joomla! Component Payage 2.05 - 'aid' SQL Injection","URL":"https://www.exploit-db.com/exploits/42113"}, {"Title":"Joomla! Component PaymentsPlus 2.1.5 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14265"}, {"Title":"Joomla! Component PayPal IPN for DOCman 3.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41400"}, {"Title":"Joomla! Component pcchess 0.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5104"}, {"Title":"Joomla! Component Penny Auction Factory 2.0.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45466"}, {"Title":"Joomla! Component People 1.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/15989"}, {"Title":"Joomla! Component Percha Downloads Attach 1.1 - 'Controller' Traversal Arbitrary File Access","URL":"https://www.exploit-db.com/exploits/34005"}, {"Title":"Joomla! Component Percha Fields Attach 1.0 - 'Controller' Traversal Arbitrary File Access","URL":"https://www.exploit-db.com/exploits/34004"}, {"Title":"Joomla! Component Percha Gallery 1.6 Beta - 'Controller' Traversal Arbitrary File Access","URL":"https://www.exploit-db.com/exploits/34006"}, {"Title":"Joomla! Component Percha Image Attach 1.1 - 'Controller' Traversal Arbitrary File Access","URL":"https://www.exploit-db.com/exploits/34003"}, {"Title":"Joomla! Component Percha Multicategory Article 0.6 - 'Controller' Arbitrary File Access","URL":"https://www.exploit-db.com/exploits/34008"}, {"Title":"Joomla! Component Permis 1.0 (com_groups) - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/33125"}, {"Title":"Joomla! Component Phil-a-Form 1.2.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/4003"}, {"Title":"Joomla! Component Phoca Gallery 2.7.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14207"}, {"Title":"Joomla! Component Photo Battle 1.0.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12232"}, {"Title":"Joomla! Component Photo Blog alpha 3 < alpha 3a - SQL Injection","URL":"https://www.exploit-db.com/exploits/9892"}, {"Title":"Joomla! Component Photo Contest 1.0.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42563"}, {"Title":"Joomla! Component PHP-Bridge 1.2.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42414"}, {"Title":"Joomla! Component Picasa 2.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12058"}, {"Title":"Joomla! Component Picasa2Gallery 1.2.8 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/13981"}, {"Title":"Joomla! Component PicSell 1.0 - Local File Disclosure","URL":"https://www.exploit-db.com/exploits/14845"}, {"Title":"Joomla! Component Picture Calendar for Joomla 3.1.4 - Directory Traversal","URL":"https://www.exploit-db.com/exploits/43931"}, {"Title":"Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11814"}, {"Title":"Joomla! Component Poll 1.0.10 - Arbitrary Add Votes","URL":"https://www.exploit-db.com/exploits/2219"}, {"Title":"Joomla! Component Pony Gallery 1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/4201"}, {"Title":"Joomla! Component Portfol 1.2 - 'vcatid' SQL Injection","URL":"https://www.exploit-db.com/exploits/7734"}, {"Title":"Joomla! Component Portfolio Gallery 1.0.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/40852"}, {"Title":"Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12118"}, {"Title":"Joomla! Component prayercenter 1.4.9 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5708"}, {"Title":"Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection","URL":"https://www.exploit-db.com/exploits/44160"}, {"Title":"Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12147"}, {"Title":"Joomla! Component Price Alert 3.0.2 - 'product_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/42553"}, {"Title":"Joomla! Component Proclaim 9.1.1 - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/44164"}, {"Title":"Joomla! Component Proclaim 9.1.1 - Backup File Download","URL":"https://www.exploit-db.com/exploits/44159"}, {"Title":"Joomla! Component ProDesk 1.0/1.2 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/6980"}, {"Title":"Joomla! Component ProDesk 1.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/15460"}, {"Title":"Joomla! Component ProductShowcase 1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5237"}, {"Title":"Joomla! Component Project Log 1.5.3 - 'search' SQL Injection","URL":"https://www.exploit-db.com/exploits/44124"}, {"Title":"Joomla! Component Projects 'com_projects' - SQL Injection / Local File Inclusion","URL":"https://www.exploit-db.com/exploits/34934"}, {"Title":"Joomla! Component Projoom NovaSFH 3.0.2 - 'upload.php' Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/39088"}, {"Title":"Joomla! Component ProofReader 1.0 RC6 - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/10291"}, {"Title":"Joomla! Component ProofReader 1.0 RC9 - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33377"}, {"Title":"Joomla! Component Property - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11851"}, {"Title":"Joomla! Component PU Arcade 2.1.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/4827"}, {"Title":"Joomla! Component Pulse Infotech Flip Wall - SQL Injection","URL":"https://www.exploit-db.com/exploits/15366"}, {"Title":"Joomla! Component QPersonel 1.0.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12200"}, {"Title":"Joomla! Component Q-Personel 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/12723"}, {"Title":"Joomla! Component Questions 1.4.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45468"}, {"Title":"Joomla! Component QuickFAQ 1.0.3 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14296"}, {"Title":"Joomla! Component Quick News - SQL Injection","URL":"https://www.exploit-db.com/exploits/10252"}, {"Title":"Joomla! Component QuickTime VR 0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5994"}, {"Title":"Joomla! Component Quiz 0.81 - 'tid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5119"}, {"Title":"Joomla! Component Quiz Deluxe 3.7.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42589"}, {"Title":"Joomla! Component Raffle Factory 3.5.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45464"}, {"Title":"Joomla! Component Rapid Recipe 1.6.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5103"}, {"Title":"Joomla! Component Rapid Recipe 1.6.6/1.6.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5759"}, {"Title":"Joomla! Component Rapid-Recipe - HTML Injection","URL":"https://www.exploit-db.com/exploits/34291"}, {"Title":"Joomla! Component Rapid-Recipe - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/14327"}, {"Title":"Joomla! Component RD-Autos 1.5.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7795"}, {"Title":"Joomla! Component RealEstateManager 3.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41429"}, {"Title":"Joomla! Component Real Estate Property 3.1.22-03 - 'aid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12136"}, {"Title":"Joomla! Component Realpin 1.5.04 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44125"}, {"Title":"Joomla! Component Realtyna RPL 8.9.2 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/38527"}, {"Title":"Joomla! Component Realtyna RPL 8.9.2 - Persistent Cross-Site Scripting / Cross-Site Request Forgery","URL":"https://www.exploit-db.com/exploits/38528"}, {"Title":"Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion (1)","URL":"https://www.exploit-db.com/exploits/12112"}, {"Title":"Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion (2)","URL":"https://www.exploit-db.com/exploits/14017"}, {"Title":"Joomla! Component Recerca - SQL Injection","URL":"https://www.exploit-db.com/exploits/10058"}, {"Title":"Joomla! Component Recipe Manager 2.2 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41496"}, {"Title":"Joomla! Component Recly!Competitions 1.0.0 - Multiple Remote File Inclusions","URL":"https://www.exploit-db.com/exploits/7039"}, {"Title":"Joomla! Component redSHOP 1.0.23.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/14368"}, {"Title":"Joomla! Component redSHOP 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12054"}, {"Title":"Joomla! Component redSHOP 1.0 - 'pid' SQL Injection","URL":"https://www.exploit-db.com/exploits/14312"}, {"Title":"Joomla! Component redSHOP 1.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/27532"}, {"Title":"Joomla! Component redTWITTER 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12055"}, {"Title":"Joomla! Component Regional Booking - 'id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11061"}, {"Title":"Joomla! Component rekry 1.0.0 - 'op_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5297"}, {"Title":"Joomla! Component Responsive Portfolio 1.6.1 - 'filter_order_Dir' SQL Injection","URL":"https://www.exploit-db.com/exploits/45491"}, {"Title":"Joomla! Component Responsive Portfolio 1.6.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42564"}, {"Title":"Joomla! Component Restaurante 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5280"}, {"Title":"Joomla! Component Restaurante - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/4383"}, {"Title":"Joomla! Component Restaurant Guide 1.0.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/15040"}, {"Title":"Joomla! Component Reverse Auction Factory 4.3.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45475"}, {"Title":"Joomla! Component RokModule 1.1 - 'module' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/21221"}, {"Title":"Joomla! Component RokModule 1.1 - 'moduleid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/12148"}, {"Title":"Joomla! Component Room Management 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41389"}, {"Title":"Joomla! Component RSComments 1.0.0 - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/13935"}, {"Title":"Joomla! Component RSfiles 1.0.2 - 'path' File Download","URL":"https://www.exploit-db.com/exploits/4307"}, {"Title":"Joomla! Component rsmonials - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/8517"}, {"Title":"Joomla! Component RWCards 2.4.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/3565"}, {"Title":"Joomla! Component RWCards 3.0.11 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/6817"}, {"Title":"Joomla! Component Saber Cart 1.0.0.12 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12082"}, {"Title":"Joomla! Component Saxum Astro 4.0.14 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44133"}, {"Title":"Joomla! Component Saxum Numerology 3.0.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44134"}, {"Title":"Joomla! Component Saxum Picker 3.2.10 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44136"}, {"Title":"Joomla! Component Scriptegrator 1.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/17394"}, {"Title":"Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/30655"}, {"Title":"Joomla! Component Search 3.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/17646"}, {"Title":"Joomla! Component Search Log 3.1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/13746"}, {"Title":"Joomla! Component SecurityCheck 2.8.9 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/39879"}, {"Title":"Joomla! Component Seminar 1.28 - 'id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/8867"}, {"Title":"Joomla! Component SermonSpeaker - SQL Injection","URL":"https://www.exploit-db.com/exploits/12184"}, {"Title":"Joomla! Component Sexy polling 1.0.8 - 'answer_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/39028"}, {"Title":"Joomla! Component Shoutbox Pro - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12067"}, {"Title":"Joomla! Component SIMGenealogy 2.1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42413"}, {"Title":"Joomla! Component SimpleCalendar 3.1.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44126"}, {"Title":"Joomla! Component simpledownload 0.9.5 - Local File Disclosure","URL":"https://www.exploit-db.com/exploits/12623"}, {"Title":"Joomla! Component simpledownload 0.9.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12618"}, {"Title":"Joomla! Component Simple Membership 3.3.3 - 'userId' SQL Injection","URL":"https://www.exploit-db.com/exploits/41599"}, {"Title":"Joomla! Component simple_review 1.x - SQL Injection","URL":"https://www.exploit-db.com/exploits/7667"}, {"Title":"Joomla! Component Simple RSS Reader 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/7096"}, {"Title":"Joomla! Component simple shop 2.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5177"}, {"Title":"Joomla! Component SimpleShop 3.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/5743"}, {"Title":"Joomla! Component Simple Shop Galore 3.x - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5833"}, {"Title":"Joomla! Component Smart Shoutbox 3.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44127"}, {"Title":"Joomla! Component SmartSite 1.0.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12428"}, {"Title":"Joomla! Component SMEStorage - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11853"}, {"Title":"Joomla! Component SMF Forum 1.1.4 - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/31008"}, {"Title":"Joomla! Component Soccer Bet 4.1.5 - 'cat' SQL Injection","URL":"https://www.exploit-db.com/exploits/41327"}, {"Title":"Joomla! Component Soccer Bet 4.1.5 - 'userid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41328"}, {"Title":"Joomla! Component Social Factory 3.8.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45470"}, {"Title":"Joomla! Component Solidres 2.5.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44128"}, {"Title":"Joomla! Component Soundset 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/10067"}, {"Title":"Joomla! Component Spider Calendar 3.2.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/34571"}, {"Title":"Joomla! Component Spider Calendar - 'date' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/23782"}, {"Title":"Joomla! Component Spider Calendar Lite 3.2.16 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41371"}, {"Title":"Joomla! Component Spider Calendar - SQL Injection","URL":"https://www.exploit-db.com/exploits/20983"}, {"Title":"Joomla! Component Spider Catalog 1.1 - 'Product_ID' SQL Injection","URL":"https://www.exploit-db.com/exploits/22403"}, {"Title":"Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41372"}, {"Title":"Joomla! Component Spider Contacts 1.3.6 - 'contacts_id' SQL Injection","URL":"https://www.exploit-db.com/exploits/34625"}, {"Title":"Joomla! Component Spider Facebook 1.6.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41373"}, {"Title":"Joomla! Component Spider FAQ Lite 1.3.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41374"}, {"Title":"Joomla! Component Spider FAQ - SQL Injection","URL":"https://www.exploit-db.com/exploits/36464"}, {"Title":"Joomla! Component spidervideoplayer - 'theme' SQL Injection","URL":"https://www.exploit-db.com/exploits/39294"}, {"Title":"Joomla! Component Spinner 360 1.3.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41464"}, {"Title":"Joomla! Component SP Movie Database 1.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42502"}, {"Title":"Joomla! Component Sponsor Wall 1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/15367"}, {"Title":"Joomla! Component Sponsor Wall 7.0 - 'wallid' SQL Injection","URL":"https://www.exploit-db.com/exploits/41325"}, {"Title":"Joomla! Component Sponsor Wall 8.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42525"}, {"Title":"Joomla! Component SportFusion 0.2.x - SQL Injection","URL":"https://www.exploit-db.com/exploits/33237"}, {"Title":"Joomla! Component SquadManagement 1.0.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44135"}, {"Title":"Joomla! Component Staff Master 1.0 RC 1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44129"}, {"Title":"Joomla! Component StaticXT - SQL Injection","URL":"https://www.exploit-db.com/exploits/14395"}, {"Title":"Joomla! Component Store for K2 3.8.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41440"}, {"Title":"Joomla! Component StreetGuessr Game 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41494"}, {"Title":"Joomla! Component StreetGuessr Game 1.1.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42423"}, {"Title":"Joomla! Component Survey Force Deluxe 3.2.4 - 'invite' SQL Injection","URL":"https://www.exploit-db.com/exploits/42606"}, {"Title":"Joomla! Component SVMap 1.1.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12066"}, {"Title":"Joomla! Component Swap Factory 2.2.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45473"}, {"Title":"Joomla! Component Sweetykeeper 1.5 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12182"}, {"Title":"Joomla! Component Table JX - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/12473"}, {"Title":"Joomla! Component Team Display 1.2.1 - 'filter_category' SQL Injection","URL":"https://www.exploit-db.com/exploits/41379"}, {"Title":"Joomla! Component Teams - Multiple Blind SQL Injections","URL":"https://www.exploit-db.com/exploits/14598"}, {"Title":"Joomla! Component Tech Article 1.x - SQL Injection","URL":"https://www.exploit-db.com/exploits/7504"}, {"Title":"Joomla! Component Techfolio 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/18042"}, {"Title":"Joomla! Component Techjoomla SocialAds - Persistent Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/14196"}, {"Title":"Joomla! Component Template Be2004-2 - 'index.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3759"}, {"Title":"Joomla! Component Thyme 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7182"}, {"Title":"Joomla! Component Time Returns 2.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/17944"}, {"Title":"Joomla! Component Timetable Responsive Schedule For Joomla 1.5 - 'alias' SQL Injection","URL":"https://www.exploit-db.com/exploits/44130"}, {"Title":"Joomla! Component Timetable Schedule 3.6.8 - SQL Injection","URL":"https://www.exploit-db.com/exploits/45478"}, {"Title":"Joomla! Component TimeTrack 1.2.4 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/15084"}, {"Title":"Joomla! Component Tour de France Pool 1.0.1 Module - MosConfig_absolute_path Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/30445"}, {"Title":"Joomla! Component TPDugg 1.1 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/9602"}, {"Title":"Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12151"}, {"Title":"Joomla! Component TTVideo 1.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14481"}, {"Title":"Joomla! Component Turtushout 0.11 - 'Name' SQL Injection","URL":"https://www.exploit-db.com/exploits/9653"}, {"Title":"Joomla! Component TweetLA 1.0.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12142"}, {"Title":"Joomla! Component Twitch Tv 1.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42493"}, {"Title":"Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12426"}, {"Title":"Joomla! Component Ultimate Property Listing 1.0.2 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42417"}, {"Title":"Joomla! Component User Bench 1.0 - 'userid' SQL Injection","URL":"https://www.exploit-db.com/exploits/43357"}, {"Title":"Joomla! Component UserExtranet 1.3.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41441"}, {"Title":"Joomla! Component user_id com_sqlreport - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/11549"}, {"Title":"Joomla! Component User Status - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11998"}, {"Title":"Joomla! Component vAccount 2.0.2 - 'vid' SQL Injection","URL":"https://www.exploit-db.com/exploits/46226"}, {"Title":"Joomla! Component vBizz 1.0.7 - Remote Code Execution","URL":"https://www.exploit-db.com/exploits/46224"}, {"Title":"Joomla! Component vBizz 1.0.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46223"}, {"Title":"Joomla! Component VehicleManager 3.9 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41428"}, {"Title":"Joomla! Component versioning 1.0.2 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5989"}, {"Title":"Joomla! Component Vik Appointments 1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41602"}, {"Title":"Joomla! Component Vik Booking 1.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41326"}, {"Title":"Joomla! Component Vik Real Estate 1.0 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/36592"}, {"Title":"Joomla! Component Vik Real Estate 1.0 - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/18048"}, {"Title":"Joomla! Component Vik Rent Car 1.11 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41604"}, {"Title":"Joomla! Component Vik Rent Items 1.3 - SQL Injection","URL":"https://www.exploit-db.com/exploits/41603"}, {"Title":"Joomla! Component VirtueMart Google Base 1.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/6975"}, {"Title":"Joomla! Component VirtueMart Joomla! eCommerce Edition 1.0.11 - Multiple Input Validation Vulnerabilities","URL":"https://www.exploit-db.com/exploits/28719"}, {"Title":"Joomla! Component VirtueMart Module Customers_who_bought - SQL Injection","URL":"https://www.exploit-db.com/exploits/11270"}, {"Title":"Joomla! Component Visites 1.1 - MosConfig_absolute_path Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/31708"}, {"Title":"Joomla! Component Visites 1.1 RC2 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/14476"}, {"Title":"Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/43933"}, {"Title":"Joomla! Component VJDEO 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12102"}, {"Title":"Joomla! Component VMap 1.9.6 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46229"}, {"Title":"Joomla! Component Volunteer 2.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/7546"}, {"Title":"Joomla! Component vRestaurant 1.9.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46228"}, {"Title":"Joomla! Component vReview 1.9.11 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46227"}, {"Title":"Joomla! Component vWishlist 1.0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/46225"}, {"Title":"Joomla! Component Wap4Joomla - 'wapmain.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/12440"}, {"Title":"Joomla! Component Webee Comments 1.1/1.2 - 'index2.php' articleId SQL Injection","URL":"https://www.exploit-db.com/exploits/33637"}, {"Title":"Joomla! Component Webee Comments 1.1/1.2 - Multiple BBCode Tags Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/33638"}, {"Title":"Joomla! Component webERPcustomer - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11999"}, {"Title":"Joomla! Component Webhosting - 'catid' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5527"}, {"Title":"Joomla! Component Weblinks - 'Itemid' SQL Injection","URL":"https://www.exploit-db.com/exploits/34475"}, {"Title":"Joomla! Component WebMaster-Tips.net Joomla! RSS Feed Reader 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/30651"}, {"Title":"Joomla! Component Webring 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/2177"}, {"Title":"Joomla! Component Web TV 1.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12166"}, {"Title":"Joomla! Component WMI 1.5.0 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12316"}, {"Title":"Joomla! Component WMT Content Timeline 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/41382"}, {"Title":"Joomla! Component wmtportfolio 1.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/4497"}, {"Title":"Joomla! Component Xe webtv - 'id' Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5966"}, {"Title":"Joomla! Component xfaq 1.2 - 'aid' SQL Injection","URL":"https://www.exploit-db.com/exploits/5109"}, {"Title":"Joomla! Component XOBBIX 1.0 - 'prodid' SQL Injection","URL":"https://www.exploit-db.com/exploits/12097"}, {"Title":"Joomla! Component xsstream-dm 0.01b - SQL Injection","URL":"https://www.exploit-db.com/exploits/5587"}, {"Title":"Joomla! Component xstandard editor 1.5.8 - Local Directory Traversal","URL":"https://www.exploit-db.com/exploits/7691"}, {"Title":"Joomla! Component Yelp - SQL Injection","URL":"https://www.exploit-db.com/exploits/11308"}, {"Title":"Joomla! Component Ynews 1.0.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/5072"}, {"Title":"Joomla! Component YOOtheme Warp5 - 'yt_color' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33392"}, {"Title":"Joomla! Component You!Hostit! 1.0.1 Template - Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/33393"}, {"Title":"Joomla! Component YouTube 1.5 - SQL Injection","URL":"https://www.exploit-db.com/exploits/14467"}, {"Title":"Joomla! Component Youtube Gallery 4.1.7 - SQL Injection","URL":"https://www.exploit-db.com/exploits/34087"}, {"Title":"Joomla! Component yt_color YOOOtheme - Cross-Site Scripting / Cookie Stealing","URL":"https://www.exploit-db.com/exploits/10318"}, {"Title":"Joomla! Component yvComment 1.16 - Blind SQL Injection","URL":"https://www.exploit-db.com/exploits/5755"}, {"Title":"Joomla! Component Zap Calendar Lite 4.3.4 - SQL Injection","URL":"https://www.exploit-db.com/exploits/42500"}, {"Title":"Joomla! Component Zh BaiduMap 3.0.0.1 - SQL Injection","URL":"https://www.exploit-db.com/exploits/43974"}, {"Title":"Joomla! Component Zh GoogleMap 8.4.0.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/43976"}, {"Title":"Joomla! Component Zh YandexMap 6.1.1.0 - 'placemarklistid' SQL Injection","URL":"https://www.exploit-db.com/exploits/43093"}, {"Title":"Joomla! Component Zh YandexMap 6.2.1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/43975"}, {"Title":"Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12283"}, {"Title":"Joomla! Component ZiMBCore 0.1 - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/12284"}, {"Title":"Joomla Convert Forms version 2.0.3 - Formula Injection (CSV Injection)","URL":"https://www.exploit-db.com/exploits/44447"}, {"Title":"Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion","URL":"https://www.exploit-db.com/exploits/46710"}, {"Title":"Joomla! Core 3.9.1 - Persistent Cross-Site Scripting in Global Configuration Textfilter Settings","URL":"https://www.exploit-db.com/exploits/46200"}, {"Title":"Joomla! Extension iF Portfolio Nexus - SQL Injection","URL":"https://www.exploit-db.com/exploits/10177"}, {"Title":"Joomla! Extension UIajaxIM 1.1 - JavaScript Execution","URL":"https://www.exploit-db.com/exploits/9244"}, {"Title":"Joomla! / Mambo Component Artists - 'idgalery' SQL Injection","URL":"https://www.exploit-db.com/exploits/31857"}, {"Title":"Joomla! / Mambo Component Cinema 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31529"}, {"Title":"Joomla! / Mambo Component com_activities - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31207"}, {"Title":"Joomla! / Mambo Component com_asortyment - 'katid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31274"}, {"Title":"Joomla! / Mambo Component com_blog - 'pid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31292"}, {"Title":"Joomla! / Mambo Component com_buslicense - 'aid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31077"}, {"Title":"Joomla! / Mambo Component com_catalogproduction - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/7095"}, {"Title":"Joomla! / Mambo Component com_comments 0.5.8.5g - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31137"}, {"Title":"Joomla! / Mambo Component com_detail - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31226"}, {"Title":"Joomla! / Mambo Component com_formtool - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31245"}, {"Title":"Joomla! / Mambo Component com_genealogy - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31246"}, {"Title":"Joomla! / Mambo Component com_guide - 'category' SQL Injection","URL":"https://www.exploit-db.com/exploits/31410"}, {"Title":"Joomla! / Mambo Component com_hello_world - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31288"}, {"Title":"Joomla! / Mambo Component com_iigcatalog - 'cat' SQL Injection","URL":"https://www.exploit-db.com/exploits/31244"}, {"Title":"Joomla! / Mambo Component com_inter - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31303"}, {"Title":"Joomla! / Mambo Component com_iomezun - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31155"}, {"Title":"Joomla! / Mambo Component com_is 1.0.1 - Multiple SQL Injections","URL":"https://www.exploit-db.com/exploits/32010"}, {"Title":"Joomla! / Mambo Component com_Joomlavvz - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31272"}, {"Title":"Joomla! / Mambo Component com_lexikon - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31214"}, {"Title":"Joomla! / Mambo Component com_model - 'objid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31192"}, {"Title":"Joomla! / Mambo Component com_most - 'secid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31273"}, {"Title":"Joomla! / Mambo Component com_omnirealestate - 'objid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31193"}, {"Title":"Joomla! / Mambo Component com_profile - 'oid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31224"}, {"Title":"Joomla! / Mambo Component Comprofiler 1.0 - 'class.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/28437"}, {"Title":"Joomla! / Mambo Component com_publication - 'pid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31291"}, {"Title":"Joomla! / Mambo Component com_salesrep - 'rid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31213"}, {"Title":"Joomla! / Mambo Component com_scheduling - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31216"}, {"Title":"Joomla! / Mambo Component com_sermon 0.2 - 'gid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31121"}, {"Title":"Joomla! / Mambo Component com_sg - 'pid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31208"}, {"Title":"Joomla! / Mambo Component com_smslist - 'listid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31206"}, {"Title":"Joomla! / Mambo Component com_team - SQL Injection","URL":"https://www.exploit-db.com/exploits/31243"}, {"Title":"Joomla! / Mambo Component com_trade - 'PID' Cross-Site Scripting","URL":"https://www.exploit-db.com/exploits/34833"}, {"Title":"Joomla! / Mambo Component com_utchat 0.2 - Multiple Remote File Inclusions","URL":"https://www.exploit-db.com/exploits/32187"}, {"Title":"Joomla! / Mambo Component com_wines 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31295"}, {"Title":"Joomla! / Mambo Component D4J eZine 2.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/10178"}, {"Title":"Joomla! / Mambo Component Datsogallery 1.3.1 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31448"}, {"Title":"Joomla! / Mambo Component Download3000 1.0 - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31530"}, {"Title":"Joomla! / Mambo Component ensenanzas - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31382"}, {"Title":"Joomla! / Mambo Component eXtplorer - Code Execution","URL":"https://www.exploit-db.com/exploits/8136"}, {"Title":"Joomla! / Mambo Component faq - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31209"}, {"Title":"Joomla! / Mambo Component Filebase - 'filecatid' SQL Injection","URL":"https://www.exploit-db.com/exploits/31215"}, {"Title":"Joomla! / Mambo Component gigCalendar 1.0 - 'banddetails.php' SQL Injection","URL":"https://www.exploit-db.com/exploits/32807"}, {"Title":"Joomla! / Mambo Component Joo!BB 0.5.9 - 'forum' SQL Injection","URL":"https://www.exploit-db.com/exploits/31870"}, {"Title":"Joomla! / Mambo Component Mod_Forum - 'PHPBB_Root.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/30227"}, {"Title":"Joomla! / Mambo Component New Article 1.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3736"}, {"Title":"Joomla! / Mambo Component Referenzen - 'id' SQL Injection","URL":"https://www.exploit-db.com/exploits/31280"}, {"Title":"Joomla! / Mambo Component rsgallery 2.0b5 - 'catid' SQL Injection","URL":"https://www.exploit-db.com/exploits/4691"}, {"Title":"Joomla! / Mambo Component Showroom Joomlearn LMS - 'cat' SQL Injection","URL":"https://www.exploit-db.com/exploits/31595"}, {"Title":"Joomla! / Mambo Component SWmenu 4.0 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3557"}, {"Title":"Joomla! / Mambo Component Taskhopper 1.1 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/3703"}, {"Title":"Joomla! / Mambo Component Tupinambis - SQL Injection","URL":"https://www.exploit-db.com/exploits/9832"}, {"Title":"Joomla! Pinterest Clone Social Pinboard 2.0 - SQL Injection","URL":"https://www.exploit-db.com/exploits/44131"}, {"Title":"Joomla! Plugin Beatz 1.1 - Multiple Cross-Site Scripting Vulnerabilities","URL":"https://www.exploit-db.com/exploits/37083"}, {"Title":"Joomla! Plugin Captcha 4.5.1 - Local File Disclosure","URL":"https://www.exploit-db.com/exploits/15958"}, {"Title":"Joomla! Plugin Core Design Scriptegrator - Local File Inclusion","URL":"https://www.exploit-db.com/exploits/11498"}, {"Title":"Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-comments-post.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/28295"}, {"Title":"Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-feed.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/28296"}, {"Title":"Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-trackback.php' Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/28297"}, {"Title":"Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion","URL":"https://www.exploit-db.com/exploits/9890"}, {"Title":"Joomla! Plugin NoNumber Framework - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/17995"}, {"Title":"Joomla! Plugin tinybrowser 1.5.12 - Arbitrary File Upload / Code Execution (Metasploit)","URL":"https://www.exploit-db.com/exploits/16906"}, {"Title":"Joomla! Plugin tinybrowser 1.5.12 - Arbitrary File Upload / Execution","URL":"https://www.exploit-db.com/exploits/9926"}, {"Title":"WordPress Plugin 0.9.7 / Joomla! Component 2.0.0 Creative Contact Form - Arbitrary File Upload","URL":"https://www.exploit-db.com/exploits/35057"}, {"Title":"WordPress Plugin / Joomla! Component XCloner - Multiple Vulnerabilities","URL":"https://www.exploit-db.com/exploits/35212"} ], "DB_PATH_SHELLCODE": "/usr/share/exploitdb", "RESULTS_SHELLCODE": [ ] }

oppsec commented 3 years ago

Hello @d4op, thanks for opening a issue.

  1. I will improve the version matching system, for now, I just verify if the detected version is lower than the vulnerability affected version.

  2. You've sent vulnerabilities for plugins, components and themes and the vulns module just works for Joomla core version.

If you want to contribute with the code, open a pull request and I'll analyze and maybe accept it

Best regards, knightmare.