header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple Cross-Site Scripting and Information Disclosure Vulnerabilities in Jira

The Jira application fails to sanitize user-supplied input, leading to multiple cross-site scripting vulnerabilities and an information disclosure vulnerability. Attackers can exploit these vulnerabilities to obtain sensitive information, steal cookie-based authentication information, and execute arbitrary client-side scripts in the context of the browser.

Magic CMS v4.2.747 (mysave.php) Remote File Inclusion

The vulnerability exists in the mysave.php file of Magic CMS v4.2.747. It allows an attacker to include a remote file by manipulating the 'file' parameter in the URL. This vulnerability can only be exploited when the 'register_globals' setting is turned on. The vulnerability is discovered by DNX and reported on 03.03.2007. The PoC URL to exploit this vulnerability is 'http://[site]/[path]/mysave.php?file=[shell]'. The vendor, www.geo-soft.net/de-ch/, has not provided a patch or update for this vulnerability.

SyndeoCMS Multiple HTML-Injection Vulnerabilities

SyndeoCMS is prone to multiple HTML-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

Portili Personal and Team Wiki Multiple Vulnerabilities

Attackers can exploit these issues to obtain sensitive information, steal cookie-based authentication information, upload arbitrary files to the affected computer, and execute arbitrary script code in the context of the browser.

Joomla! FreiChat HTML Injection Vulnerability

Joomla! FreiChat component is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

SQL Injection and Cross-Site Scripting Vulnerabilities in MC Content Manager

MC Content Manager is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Cross-Site Scripting Vulnerability in SAP Netweaver

The vulnerability exists in SAP Netweaver due to improper input sanitization. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a user visiting the affected site. This can lead to the theft of authentication credentials and other malicious activities.

Recent Exploits: