
5 changes to exploits/shellcodes/ghdb SolarWinds Platform 2024.1 SR1 - Race Condition Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS) Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated) Poultry Farm Management System v1.0 - Remote Code Execution (RCE)
11 lines
No EOL
477 B
Text
11 lines
No EOL
477 B
Text
# Exploit Title: Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated)
|
|
# Date: 2024-06-23
|
|
# Exploit Author: tmrswrr
|
|
# Category : Webapps
|
|
# Vendor Homepage: https://flatboard.org/
|
|
# Version: 3.2
|
|
# PoC:
|
|
|
|
1-Login admin panel , go to this url : https://127.0.0.1//Flatboard/index.php/forum
|
|
2-Click Add Forum and write in Information field your payload : "><img src=x onerrora=confirm() onerror=confirm(document.cookie)>
|
|
3-Save it , you will be payload will be executed |