header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Super Socializer 7.13.52 – Reflected XSS

The Super Socializer plugin version 7.13.52 is vulnerable to a reflected XSS vulnerability. Attackers can exploit this vulnerability by injecting malicious JavaScript code into the vulnerable parameter. When a user visits a crafted URL containing the payload, the injected code will be executed in the user's browser, potentially allowing the attacker to steal sensitive information or perform unauthorized actions on behalf of the user.

WP Sticky Social 1.0.1 – Cross-Site Request Forgery to Stored Cross-Site Scripting (XSS)

The WP Sticky Social plugin version 1.0.1 is vulnerable to Cross-Site Request Forgery (CSRF) and Stored Cross-Site Scripting (XSS) attacks. An attacker can exploit this vulnerability to perform malicious actions on behalf of an authenticated user and inject arbitrary script code into the affected site.

WordPress Theme Medic v1.0.0 – Weak Password Recovery Mechanism for Forgotten Password

The WordPress Theme Medic v1.0.0 has a weak password recovery mechanism for forgotten passwords. This vulnerability allows an attacker to reset a user's password without proper authorization. The vulnerability can be exploited by sending a specially crafted password reset link to the targeted user's email address.

Symantec SiteMinder WebAgent v12.52 – Cross-site scripting (XSS)

I am writing to report two XSS vulnerabilities (CVE-2023-23956) that I have discovered in the Symantec SiteMinder WebAgent. The vulnerability is related to the improper handling of user input and has been assigned the Common Weakness Enumeration (CWE) code CWE-79. The CVSSv3 score for this vulnerability is 5.4.

Diafan CMS 6.0 – Reflected Cross-Site Scripting (XSS)

The Diafan CMS version 6.0 is vulnerable to a reflected cross-site scripting (XSS) attack. This can be exploited by an attacker by injecting malicious script code into the 'Search in the goods > Article' field on the main page of the CMS. When a user interacts with the injected payload, it will execute the script code in the user's browser, potentially leading to unauthorized actions or data theft. An example payload that triggers an alert with the document domain is provided: "><script>alert(document.domain)<%2Fscript>

Student Study Center Management System v1.0 – Stored Cross-Site Scripting (XSS)

The Student Study Center Management System V1.0, developed by PHPGurukul, is susceptible to a critical security vulnerability known as Stored Cross-Site Scripting (XSS). This vulnerability enables attackers to inject malicious JavaScript code, which is then stored and executed by the application. The underlying issue lies in the system's failure to adequately sanitize and validate user-provided input within the "Admin Name" field on the Admin Profile page, thereby allowing attackers to inject arbitrary JavaScript code.

Jobpilot v2.61 – SQL Injection

The Jobpilot v2.61 application is vulnerable to SQL Injection. The vulnerability can be exploited through the 'long' parameter in a GET request. The exploit allows an attacker to execute arbitrary SQL queries, potentially gaining unauthorized access to the database. The PoC includes error-based and time-based blind SQL injection payloads.

Recent Exploits: