Home / os / win7

Ashiyane Training Center Site Scripting

Posted on 30 November -0001

<HTML><HEAD><TITLE>Ashiyane Training Center Site Scripting</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|=============================================================| |[+] Exploit Title: Ashiyane Training Center Site Scripting |[+] |[+] Exploit Author: Hacker.khan |[+] |[+] Vendor Homepage: http://train.ashiyane.ir |[+] |[+] Tested on: Win7 |[+] |[+] Date: 2017-01-17 |=============================================================| |[+] The use of this vulnerability through which an attacker Hackbr plugin using scripts can be run on your site |[+] Vulnerability Path : http://train.ashiyane.ir/register/mail.php |[+] Put the code in the plug-hacking on the box |[+] Enable post data |[+] D1="><script>alert(/xss/)</script> |[+] ID: Hacker.khan@xtra.co.nz ================================================================= |[+] Thanks to : Iranian Anonymous |[+] Exploit Author: Hacker.khan </BODY></HTML>

 

TOP