# Exploit Title: Xss on skeletonz-simple dynamic cms in the section comments # Google Dork: # Date: 27/11/10 # Author: Jordan Diaz aka Jbyte # Software Link: http://orangoo.com/skeletonz/ # Version: 1.0 # Tested on: Windows xp # CVE : The follow xss is located in the section of comments of the CMS skeletonz Xss Exploit field Name: field Comment: