exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29481
The provided text describes multiple XSS vulnerabilities in Indexu 5.3.0 and prior versions due to improper input sanitization in the 'sendmail.php' script. It lists vulnerable parameters but does not include executable exploit code.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior
No auth needed
Prerequisites:
Access to the vulnerable 'sendmail.php' endpoint
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29484
The provided text describes a cross-site scripting (XSS) vulnerability in Indexu 5.3.0 and prior versions. It explains the issue and provides a sample exploit URL but does not include functional exploit code.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29489
This is a writeup describing a cross-site scripting (XSS) vulnerability in Indexu 5.3.0 and prior versions. The vulnerability arises from improper sanitization of user-supplied input in the 'error_msg' parameter of login.php.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the target application's login page
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29488
The provided text describes a cross-site scripting (XSS) vulnerability in Indexu 5.3.0 and prior versions. It includes example URLs demonstrating how arbitrary script code can be executed in the context of the affected site.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the target application
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29487
The provided text describes a cross-site scripting (XSS) vulnerability in Indexu 5.3.0 and prior versions. It outlines the vulnerability's impact and provides example URLs demonstrating the XSS vectors.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29486
The provided text describes multiple XSS vulnerabilities in Indexu 5.3.0 and prior versions due to improper input sanitization in the 'power_search.php' script. It includes example URLs demonstrating the vulnerability but does not contain executable exploit code.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29485
The provided text describes multiple cross-site scripting (XSS) vulnerabilities in Indexu 5.3.0 and prior versions. It outlines how an attacker can inject arbitrary script code via unsanitized input parameters in the register.php file.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the target application's register.php endpoint
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29483
The provided text describes multiple XSS vulnerabilities in Indexu 5.3.0 and prior versions due to improper input sanitization in the 'send_pwd.php' script. It includes example URLs demonstrating the vulnerability but does not contain executable exploit code.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior
No auth needed
Prerequisites:
Access to the vulnerable 'send_pwd.php' endpoint
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29478
The provided text describes a cross-site scripting (XSS) vulnerability in Indexu 5.3.0 and prior versions. It explains the issue and provides a sample URL to demonstrate the vulnerability but does not include executable exploit code.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29480
The provided text describes multiple XSS vulnerabilities in Indexu 5.3.0 and prior versions due to improper input sanitization in the 'tell_friend.php' script. It lists vulnerable parameters but does not include executable exploit code.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior
No auth needed
Prerequisites:
Access to the vulnerable 'tell_friend.php' endpoint
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29477
The provided text describes a cross-site scripting (XSS) vulnerability in Indexu 5.3.0 and prior versions. It includes a sample URL demonstrating how an attacker could exploit the vulnerability by injecting arbitrary script code via the 'gateway' parameter.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the vulnerable application
exploitdb
WRITEUP
VERIFIED
by SwEET-DeViL · textwebappsphp
https://www.exploit-db.com/exploits/29479
The provided text describes a cross-site scripting (XSS) vulnerability in Indexu 5.3.0 and prior versions. It explains the vulnerability and provides a sample URL for exploitation but does not include actual exploit code.
Classification
Writeup 90%
Target:
Indexu 5.3.0 and prior versions
No auth needed
Prerequisites:
Access to the vulnerable web application