header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GetSimple CMS My SMTP Contact Plugin 1.1.1 – CSRF to RCE

The GetSimple CMS application does not utilize the SameSite flag for the session cookie, and instead uses a CSRF token 'nonce' to protect against cross-site attacks. Version of the My SMTP Contact plugin v1.1.1 and before do not implement the CSRF token. When the administrator configures the SMTP settings, the backend PHP code of the plugin injects the admins user input into PHP code files. These user supplied values are injected into PHP strings which use double quotes, allowing variables to be expanded within the strings and variables enclosed in {} braces to attempt to evaluate complex expressions, resulting in code execution.

htmly 2.8.0 – ‘description’ Stored Cross-Site Scripting (XSS)

A stored cross-site scripting (XSS) vulnerability was discovered in htmly 2.8.0. An attacker can exploit this vulnerability to inject malicious JavaScript code into the 'description' field of the 'config.ini' file. This code will be executed in the browser of the victim when they visit the website.

Tileserver-gl 3.0.0 – ‘key’ Reflected Cross-Site Scripting (XSS)

A reflected cross-site scripting (XSS) vulnerability exists in Tileserver-gl versions <3.1.0. An attacker can exploit this vulnerability by sending a maliciously crafted URL to the victim. The malicious URL contains a malicious script that is executed in the victim's browser when the URL is accessed. The malicious script can be used to steal the victim's session information or to perform other malicious activities.

jQuery 1.0.3 – Cross-Site Scripting (XSS)

jQuery versions greater than or equal to 1.0.3 and before 3.5.0 are vulnerable to Cross-Site Scripting (XSS). Two proof of concepts have been provided, one for jQuery versions greater than or equal to 1.0.3 and before 3.5.0 and the other for jQuery 3.x. The first proof of concept involves using a style tag with an img tag containing an onerror attribute. The second proof of concept involves using an img tag with an alt and title attribute containing a malicious payload.

jQuery 1.2 – Cross-Site Scripting (XSS)

A Cross-Site Scripting (XSS) vulnerability exists in jQuery versions greater than or equal to 1.2 and before 3.5.0. An attacker can inject malicious code into the vulnerable application, which will be executed in the victim's browser. Proof of Concept 1: <option><style></option></select><img src=x onerror=alert(1)></style>

MariaDB 10.2 /MySQL – ‘wsrep_provider’ OS Command Execution

An OS command execution vulnerability exists in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An attacker can exploit this vulnerability by creating a reverse shell payload, starting a listener, copying the payload to the target machine, and executing the payload.

CITSmart ITSM 9.1.2.27 – ‘query’ Time-based Blind SQL Injection (Authenticated)

To exploit this flaw it is necessary to be authenticated. The vulnerable URL is https://vulnsite.com/citsmart/pages/smartPortal/pages/autoCompletePortal/autoCompletePortal.load?idPortfolio=&idServico=&query=fale and the vulnerable parameter is 'query'. Sqlmap usage is sqlmap -u "https://vulnsite.com/citsmart/pages/smartPortal/pages/autoCompletePortal/autoCompletePortal.load?idPortfolio=&idServico=&query=fale" --cookie 'JSESSIONID=xxx' --time-sec 1 --prefix ")" --suffix "AND ('abc%'='abc" --sql-shell

Recent Exploits: