670
VMScore

CVE-2018-6376

Published: 30/01/2018 Updated: 13/02/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Joomla! prior to 3.8.4, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

joomla joomla\\!

Github Repositories

Second Order SQL injection using python

Joomla-383-Exploit Second Order SQL injection using python This is an exploit that targets the privilege escalation vulnerability found in certain Joomla! versions Vulnerability Information CVE: CVE-2018-6376 NVD Published Date: 01/30/2018 Base Score 98 Critical Vulnerability Type Privilege Escalation Official CVE Description: In Joomla! before 384, the lack

在学习CTF、网络安全路上整合自己博客和一些资料,持续更新~

Cyberspace_Security_Learning 在学习CTF、网络安全路上整合博客和一些资料,持续更新~ 👂 置顶tips: 如果你也有自己学习路上收集的一些好资料,或者愿意展示自己的优质博客给大家欢迎fork pull request给我~ 联系邮箱 ✨ shanguang45@gmailcom 善于使用 ctrl+F 是一项非常重要的技能 最新更新时间:2021

PENTESTING-BIBLE hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources note : the file will get an continuous updates daily until it reach 1000 source -1- 3 Ways Extract Password Hashes from NTDSdit: wwwhackingarticlesin/3-ways-extract-password-hashes-from-ntds-dit -2- 3 ways to Ca

Second Order SQL injection using python

Joomla-383-Exploit Second Order SQL injection using python This is an exploit that targets the privilege escalation vulnerability found in certain Joomla! versions Vulnerability Information CVE: CVE-2018-6376 NVD Published Date: 01/30/2018 Base Score 98 Critical Vulnerability Type Privilege Escalation Official CVE Description: In Joomla! before 384, the lack

Joomla!, Second Order SQL Injection

CVE-2018-6376 Joomla!, Second Order SQL Injection Start Joomla! $ docker-compose up -d Access localhost via browser localhost:10080