TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Exploit-DB

[webapps] OpenKM 6.3.12 - Multiple

2026-04-29 · Read original ↗

ATT&CK techniques detected

4 predictions
T1190Exploit Public-Facing Application
79%
"process. getinputstream ( ) ) ) ; string output = reader. readline ( ) ; print ( " result : " + output ) ; } } catch ( ioexception e ) { { print ( " error : " + e. getmessage ( ) ) ; } } " " " script _ payload = { " csrft " : csrf _ token, " script " : exploit _ payload, " fspath…"
T1110.002Password Cracking
61%
"##es. txt file not found. please ensure the file exists in the current directory. " ) # combine usernames with cracked passwords def combine _ passwords ( ) : try : # load usernames and hashes from hashes. txt with open ( " hashes. txt ", " r " ) as file : hashes _ data = file. r…"
T1110.002Password Cracking
46%
") ) else : print _ colored ( " rce failed to return a result. ", " red " ) # function for crack hash def crack _ password ( ) : # extract hashes from hashes. txt and save to md5 _ hashes. txt def extract _ hashes _ to _ file ( ) : try : with open ( " hashes. txt ", " r " ) as fil…"
T1110.002Password Cracking
46%
"data into final _ cracked. txt final _ cracked = [ " username : passwords \ n " ] # add header for username, hash _ value in hashes _ dict. items ( ) : if hash _ value in cracked _ dict : password = cracked _ dict [ hash _ value ] final _ cracked. append ( f " { username } : { pa…"

Summary

OpenKM 6.3.12 - Multiple