RajaKadal Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.


RAJAKADAL FORUM - Tempat Berbagi Info, Ilmu dan Diskusi
 
IndeksIndeks  PortalPortal  Latest imagesLatest images  PencarianPencarian  PendaftaranPendaftaran  Login  

Share | 
 

 Google Code site XSS Vulnerable

Topik sebelumnya Topik selanjutnya Go down 
PengirimMessage
RajaKadal
Admin Jancok
Admin Jancok
RajaKadal

Jumlah posting : 532
Join date : 14.08.10
Age : 39
Lokasi : Depan Si Kokom

Google Code site XSS Vulnerable Empty
PostSubyek: Google Code site XSS Vulnerable   Google Code site XSS Vulnerable EmptyFri 16 Dec - 15:35

This vulnerability is claimed to be discovered by two people- Vansh Sharma & Vaibhuv Sharma. Previously, critical SQL Injection vulnerability was found in Google labs website by Shadman Tanjim of Bangladesh Cyber Army last June. It is expected that Google will quickly fix all these bugs to secure themselves better. 8)

Google Code site XSS Vulnerable 380989_315304831826027_100000395371385_1015362_1810665565_n

POC :

1. Go to [You must be registered and logged in to see this link.]

2. Edit HTML -> Remove All Codes

3. Type this script : <img src="<img src=search"/onerror=alert("XSS_Kadal")//"> then click DEBUG CODE

4. Then first it will show you "Sample must have <head> element" click OK and wait for the window to load if nothing happen then try the same thing again or simply you can click on RUN CODE

5. You will get a popup which is XSS. :o

Note :
Spoiler:

source from hackforum.net 8)
Kembali Ke Atas Go down
http://red-creatives.com
 

Google Code site XSS Vulnerable

Topik sebelumnya Topik selanjutnya Kembali Ke Atas 

 Similar topics

-
» 50.000 AdSense Ready Article Site Make Money
» Google Simplifier v1.05
» Behind Google Dork
» amous Online Encryption Service Crypo.com Source Code
» How to change your Joomla Site Default WYSIWYG editor?
Halaman 1 dari 1

Permissions in this forum:Anda tidak dapat menjawab topik
RajaKadal Forum :: Kadal In Your Computer-
Navigasi: