header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Rukovoditel 2.6.1 – Cross-Site Request Forgery (Change password)

A Cross-Site Request Forgery (CSRF) vulnerability exists in Rukovoditel 2.6.1 which allows an attacker to change the password of a user without their knowledge. This is achieved by sending a maliciously crafted request to the vulnerable application. The request contains a form session token and the new password which is set by the attacker. This vulnerability can be exploited by an attacker to gain access to the application.

Courier Management System 1.0 – ‘MULTIPART street ‘ SQL Injection

An attacker can exploit a SQL injection vulnerability in the Courier Management System 1.0 application by sending a malicious payload in the 'MULTIPART street' parameter of the 'ajax.php?action=save_branch' page. This will allow the attacker to inject malicious SQL code and gain access to the application's databases.

Courier Management System 1.0 – ‘First Name’ Stored XSS

Courier Management System 1.0 is vulnerable to stored XSS. An attacker can exploit this vulnerability by logging in to the CMS with any valid user credentials, clicking on the logged in username on header and selecting Manage Account, renaming the user First Name or Last Name to '<script>alert(1111)</script>', updating the profile and this will trigger the XSS. Logging out and logging in again will display the domain name.

Dolibarr 12.0.3 – SQLi to RCE

Dolibarr 12.0.3 is vulnerable to a SQL injection vulnerability which can be exploited to gain remote code execution. The vulnerability exists in the ‘loginfunction’ parameter of the ‘index.php’ page. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements. This can be used to gain access to the system and execute arbitrary code.

Jenkins 2.235.3 – ‘Description’ Stored XSS

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description that is displayed on item creation. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission. The vulnerability can be exploited by an authenticated user with Overall/Manage permission.

Openfire 4.6.0 – ‘sql’ Stored XSS

A stored cross-site scripting (XSS) vulnerability exists in Openfire 4.6.0. An attacker can send a malicious payload to the vulnerable parameter 'sql' in the 'db-access.jsp' page, which will be stored in the database and executed when the page is accessed. The payload used in this exploit is '"><ScRiPt>alert(document.cookie)</ScRiPt>', which will display the user's cookies when the page is accessed.

Openfire 4.6.0 – ‘groupchatJID’ Stored XSS

A stored cross-site scripting (XSS) vulnerability exists in Openfire 4.6.0. An attacker can send a malicious payload to the vulnerable parameter 'groupchatJID' in the 'create-bookmark.jsp' page, which will be stored in the database and executed when the page is loaded. The payload used in this exploit is '><ScRiPt>alert(document.cookie)</ScRiPt>', which will display the user's cookie information in an alert box.

Recent Exploits: