gwhconsulting Cross-Site Scripting Vulnerabilitygwhconsulting Cross-Site Scripting Vulnerability

2013.03.31
Credit: Am!r
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

################################# # # Exploit Title : gwhconsulting Cross-Site Scripting Vulnerability # # Author : IrIsT.Ir # # Discovered By : Am!r # # Home : http://IrIsT.Ir/en <== English Forum # # Software Link : http://www.gwhconsulting.ca/ # # Security Risk : High # # Version : All Version # # Tested on : GNU/Linux Ubuntu - Windows Server - win7 # # Dork : intext:"Website created by: Inphasx, GWH Consulting" # ################################# # # Expl0iTs : # # http://target.com/boatcan-review.php?ID=[Xss] # # # D3mo : # # http://www.XXXcan.com/boat-review/boatcan-review.php?ID=108[Xss] # ################################# # # Greats : B3HZ4D - C0dex - Dead.Zone - TaK.FaNaR - Beni_Vanda - 0x0ptim0us # # m3hdi - F@rid - skote_vahshat - Noter - Dj.TiniVini - Nothing - z3r0 # # sajjad13and11 - Mr Zer0 - silent - dr.koderz - IR Anonymous - joker_s # # & All Members In IrIsT.Ir # ################################# # #Tnx To : PacketstormSecurity.Org - Cxsecurity.Com - 1337day.com - exploit-db.com # #################################

References:

http://IrIsT.Ir/en


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top