exploit-db-mirror/exploits/php/webapps/35626.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

13 lines
No EOL
417 B
Text

Exploit Title: Easy File Sharing Webserver =>6.8 Persistent XSS
Date: 12/26/14
Exploit Author: SickPsycko
Vendor Homepage: http://www.sharing-file.com/
Version:6.8
Tested on: Windows 7 32bit
The exploit is within the username field.
So to exploit this vulnerability, One must place the payload into the
specified field when registering.
http://i.imgur.com/bibu81C.png
Once logged in. User will be greeted with such.