exploit-db-mirror/platforms/php/webapps/35626.txt
Offensive Security 406b1feedc Update: 2015-01-01
15 new exploits
2015-01-01 08:39:22 +00:00

13 lines
431 B
Text
Executable file

Exploit Title: Easy File Sharing Webserver =>6.8 Persistent XSS
Date: 12/26/14
Exploit Author: SickPsycko
Vendor Homepage: http://www.sharing-file.com/
Version:6.8
Tested on: Windows 7 32bit
The exploit is within the username field.
So to exploit this vulnerability, One must place the payload into the
specified field when registering.
http://i.imgur.com/bibu81C.png
Once logged in. User will be greeted with such.