Bug - Joomla JLex Review 6.0.1 - Reflected XSS | Bugs & Suggestions | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

Bug Joomla JLex Review 6.0.1 - Reflected XSS

Bug Joomla JLex Review 6.0.1 - Reflected XSS

Thread representing a bug.
LV
1
 

rvso1

Member
Joined
Aug 5, 2023
Threads
10
Likes
1
Awards
4
Credits
1,377©
Cash
0$
The attacker can send to victim a link containing a malicious URL in an email or instant message
can perform a wide variety of actions, such as stealing the victim's session token or login credentials

 
LV
1
 

ratdot

Member
Joined
Jul 23, 2023
Threads
10
Likes
20
Awards
4
Credits
4,899©
Cash
0$
The attacker can send to victim a link containing a malicious URL in an email or instant message
can perform a wide variety of actions, such as stealing the victim's session token or login credentials

*** Hidden text: cannot be quoted. ***
cghxhhz
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Top Bottom