
9 changes to exploits/shellcodes ASUS DisplayWidget Software 3.4.0.036 - 'ASUSDisplayWidgetService' Unquoted Service Path 4images 1.8 - 'limitnumber' SQL Injection (Authenticated) easy-mock 1.6.0 - Remote Code Execution (RCE) (Authenticated) Police Crime Record Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS) Police Crime Record Management System 1.0 - 'casedetails' SQL Injection Care2x Open Source Hospital Information Management 2.7 Alpha - 'Multiple' Stored XSS Simple Image Gallery System 1.0 - 'id' SQL Injection RATES SYSTEM 1.0 - Authentication Bypass
13 lines
No EOL
630 B
Text
13 lines
No EOL
630 B
Text
# Exploit Title: Police Crime Record Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
|
# Date: 12/08/2021
|
|
# Exploit Author: Ömer Hasan Durmuş
|
|
# Software Link: https://www.sourcecodester.com/php/14894/police-crime-record-management-system.html
|
|
# Version: v1.0
|
|
# Category: Webapps
|
|
# Tested on: Linux/Windows
|
|
|
|
Step 1 : Login to admin account in http://TARGET/ghpolice/login.php default credentials. (1111:admin123)
|
|
Step 2 : Then click on the "Add Staff"
|
|
Step 3 : Input "<img src=x onerror=alert(1)>" in the field "Firstname" or "Othernames"
|
|
Step 4 : Click on "Save and Continue"
|
|
Step 5 : Update page. |