header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Slider by Soliloquy 2.6.2 – ‘title’ Stored Cross Site Scripting (XSS) (Authenticated)

Install and activate the Slider by Soliloquy 2.6.2 plugin. Open Soliloquy and use 'Add New' button to add new post. Add payload to title. Payload: <script>alert(document.cookie)</script> Add any image in post. Publish the post. XSS has been triggered. Go to this url 'http://localhost/wp-admin/post.php?post=1&action=edit' XSS will trigger. - For wordpress users. Go to this url 'http://localhost/?post_type=soliloquy&p=1' XSS will trigger. - For normal users.

Online Magazine Management System 1.0 – SQLi Authentication Bypass

Admin panel authentication can be bypassed due to SQL injection vulnerability in the login form. An attacker can bypass authentication by sending the following payload: username='+or+1%3D1+limit+1+--+-%2B&password=aaaa

orangescrum 1.8.0 – ‘Multiple’ Cross-Site Scripting (XSS) (Authenticated)

A reflected Cross-Site Scripting (XSS) vulnerability exists in orangescrum 1.8.0 when an authenticated user sends a maliciously crafted request to the application. The application does not properly sanitize user-supplied input, allowing an attacker to inject arbitrary HTML or JavaScript code into the application’s response. This can be exploited to execute arbitrary HTML or JavaScript code in the context of the affected application.

orangescrum 1.8.0 – Privilege escalation (Authenticated)

The vulnerabilities in the application allow for taking over any account with which the project is assigned. The user must be assigned to the project with the account he wants to take over. The exploit involves going to the dashboard, going to the page source view, finding in source 'var PUSERS', copying 'uniq_id' victim, changing cookie 'USER_UNIQ' to 'USER_UNIQ' victim from page source and after refreshing the page, logging in to the victim's account.

Bagisto 1.3.3 – Client-Side Template Injection

A client-side template injection vulnerability in Bagisto 1.3.3 allows an attacker to inject arbitrary JavaScript code into the application. An attacker can exploit this vulnerability by registering an account and editing their profile name and address with a malicious payload. When an administrator or any other user views the profile or order, the malicious code will be executed.

CMSimple 5.4 – Local file inclusion (LFI) to Remote code execution (RCE) (Authenticated)

CMSimple 5.4 is vulnerable to Local file inclusion (LFI) to Remote code execution (RCE) when an authenticated user is present. An attacker can exploit this vulnerability by changing the functions_file parameter to php://input and sending a malicious payload to the server. This will allow the attacker to execute arbitrary code on the server.

Recent Exploits: