Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2021-51628 | CWE-79 | Unknown | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2022-09-29 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:4.0/NONE/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N | 0.02192 | 0.50148 |
C r a C k E r T H E C R A C K O F E T E R N A L M I G H T From The Ashes and Dust Rises An Unimaginable crack.... [ Exploits ] : Author : CraCkEr : Website : extensions.joomla.org Vendor : Ossolution Team Software : EDocman 1.23.3 Extension for Joomla - Reflected XSS Vuln Type: Reflected XSS Method : GET Impact : Manipulate the content of the site B4nks-NET irc.b4nks.tk #unix : : Release Notes: The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials Greets: The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL CryptoJob (Twitter) twitter.com/CryptozJob CraCkEr 2022 GET parameter 'filter_search' is vulnerable to XSS Path: index.php/edocman-layouts/categories-layouts/tree-view/search-result?filter_category_id=1&filter_search=[XSS] https://joomdonationdemo.com/edocman/index.php/edocman-layouts/categories-layouts/tree-view/search-result?filter_category_id=1&filter_search=ekmj6"onfocus="alert(1)"autofocus="fjozn [-] Done
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.