{"vulnerability": "CVE-2015-9251", "sightings": [{"uuid": "601e2196-f421-4412-bd3b-b1a55f993676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/syr00000000/6451", "content": "+] Vulnerable component: jquery v2.2.4 \n[!] Component location: https://moe.gov.sy/js/jquery.js \n[!] Total vulnerabilities: 3 \n[!] Summary: parseHTML() executes scripts in event handlers \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: 3rd party CORS request may execute \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution \n[!] Severity: low \n[!] CVE: CVE-2019-11358", "creation_timestamp": "2025-06-08T23:22:14.000000Z"}, {"uuid": "c6bc6c4f-c6b2-4ff4-93b1-afee9f7ac2ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "published-proof-of-concept", "source": "Telegram/z0Id2f_ZaBvbK6vMIcrb6djLnnbaaLvumIJZCatYfMDdGts", "content": "", "creation_timestamp": "2025-08-31T15:00:06.000000Z"}, {"uuid": "25976342-7e6e-482f-86b4-41a185530383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://gist.github.com/saronsue/5b1e14b658f1cbb3292fe0b9625bff3a", "content": "", "creation_timestamp": "2025-03-05T02:31:14.000000Z"}, {"uuid": "453dc68a-0f5f-4767-8743-44439cb057f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://gist.github.com/saronsue/10af24d173a60d727c8deb8691dd357b", "content": "", "creation_timestamp": "2025-03-05T02:43:43.000000Z"}, {"uuid": "f8e8efa5-7dd5-4155-be62-954c50cfe6e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/3827", "content": "\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0645\n\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\n\u0625\u0646 \u0634\u0627\u0621 \u0627\u0644\u0644\u0647\n\nMASA DDOS : 0\u20e38\u20e3:0\u20e30\u20e3pm\nTARIKH : 14.MAY.2024\n\nTARGET : https://cacpa.in/\nIP:        209.133.201.83\nHostname:  209-133-201-83.static.hvvc.us\nISP:       HIVELOCITY, Inc.\nASN:       AS29802\nORG:       HIVELOCITY, Inc.\nDomain: hvvc.us | adisol.in | advancegroups.co.in |\nPorts: 21 | 53 | 80 | 110 | 143 | 443 | 465 | 993 | 995 | 2082 | 2083 | 2086 | 2087 |\nHTTP status: 200 | 301 |\nProvider: HIVELOCITY, Inc.\nOrganization: HIVELOCITY, Inc.\nPossible vulnerabilities: cve-2015-9251 | cve-2019-11358 | cve-2020-11022 | cve-2020-11023 |\nGreetz:- All Muslim Hackers\n\n#TengkorakCyberCrew \n#EagleCyberCrew\n#RipperSec\n#KhalifahCyberCrew\n#HelangMerahGroup \n#LaskarPembebasanPalestina\n#TeamCyberAbabil\n#Cyberwar PaLestiNe 3.0\n#TABM MALAYSIA-PALESTINE (MyPA)\n\nCome join us!!\nhttps://t.me/MalaysiaHacktivist\nhttps://t.me/MalaysiaHacktivistz", "creation_timestamp": "2024-05-14T15:27:29.000000Z"}, {"uuid": "d385dbdb-4e73-4941-9a3c-bffe4a5d0012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "published-proof-of-concept", "source": "Telegram/RH2MhouTaF4rWCiSYSPiRSLidDsw7wvhKikMLDAO_h-s2hI", "content": "", "creation_timestamp": "2025-06-06T09:00:06.000000Z"}, {"uuid": "b7192aa1-b2ad-469d-937d-cd60ddd46efd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/syr00000000/584", "content": "+] Vulnerable component: jquery v2.2.4 \n[!] Component location: https://moe.gov.sy/js/jquery.js \n[!] Total vulnerabilities: 3 \n[!] Summary: parseHTML() executes scripts in event handlers \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: 3rd party CORS request may execute \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution \n[!] Severity: low \n[!] CVE: CVE-2019-11358", "creation_timestamp": "2025-06-08T23:22:14.000000Z"}, {"uuid": "f97201b5-1798-4cc3-aaea-ab7f3d6604a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/jokeir7x0/923", "content": "\u0625\u0639\u062f\u0627\u062f\u0627\u062a \u0627\u0644\u0643\u0648\u0643\u064a\u0632 \u063a\u064a\u0631 \u0627\u0644\u0622\u0645\u0646\u0629:\n\n\u0627\u0644\u0643\u0648\u0643\u064a\u0632: TS018af834\n\u0627\u0644\u0625\u0639\u062f\u0627\u062f\u0627\u062a:\n\u0645\u062c\u0627\u0644 \u0627\u0644\u0643\u0648\u0643\u064a\u0632 \u0648\u0627\u0633\u0639 \u062c\u062f\u064b\u0627: .www.adjd.gov.ae\n\u063a\u064a\u0627\u0628 \u0639\u0644\u0645 \u0627\u0644\u0623\u0645\u0627\u0646 Secure: \u0627\u0644\u0643\u0648\u0643\u064a\u0632 \u0644\u0627 \u064a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0639\u0644\u0627\u0645\u0629 \u0627\u0644\u0623\u0645\u0627\u0646.\n\u0631\u0624\u0648\u0633 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0645\u0641\u0642\u0648\u062f\u0629:\n\nReferrer-Policy: \u063a\u064a\u0631 \u0645\u0648\u062c\u0648\u062f \u0641\u064a \u0627\u0633\u062a\u062c\u0627\u0628\u0627\u062a HTTP.\nContent-Security-Policy: \u063a\u064a\u0631 \u0645\u0648\u062c\u0648\u062f \u0641\u064a \u0627\u0633\u062a\u062c\u0627\u0628\u0627\u062a HTTP.\n\u0645\u0644\u0641 security.txt \u0645\u0641\u0642\u0648\u062f:\n\n\u0627\u0644\u0645\u0648\u0642\u0639: https://www.adjd.gov.ae/.well-known/security.txt\n\u0625\u0635\u062f\u0627\u0631\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u0642\u062f\u064a\u0645\u0629:\n\njQuery:\n\u0627\u0644\u0625\u0635\u062f\u0627\u0631: 2.2.0\n\u062b\u063a\u0631\u0627\u062a:\nCVE-2015-9251: XSS \u0645\u0646 \u062e\u0644\u0627\u0644 \u0637\u0644\u0628\u0627\u062a Ajax \u0639\u0628\u0631 \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a.\nCVE-2019-11358: \u062a\u0644\u0648\u062b \u0628\u0631\u0648\u062a\u0648\u062a\u0627\u064a\u0628 \u0639\u0628\u0631 jQuery.extend.\nCVE-2020-11022: \u062a\u0646\u0641\u064a\u0630 \u0643\u0648\u062f \u063a\u064a\u0631 \u0645\u0648\u062b\u0648\u0642 \u0639\u0646\u062f \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 HTML.\nCVE-2020-11023: \u062a\u0646\u0641\u064a\u0630 \u0643\u0648\u062f \u063a\u064a\u0631 \u0645\u0648\u062b\u0648\u0642 \u0639\u0646\u062f \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 HTML.\n\u062a\u064f\u0639\u062a\u0628\u0631 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0630\u0627\u062a \u0623\u0647\u0645\u064a\u0629\u060c \u0648\u064a\u062c\u0628 \u0645\u0639\u0627\u0644\u062c\u062a\u0647\u0627 \u0628\u0633\u0631\u0639\u0629 \u0644\u062a\u062d\u0633\u064a\u0646 \u0627\u0644\u0623\u0645\u0627\u0646.", "creation_timestamp": "2024-09-24T19:34:14.000000Z"}, {"uuid": "902ff7c7-e92b-46d7-ba7b-121049337812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/KMPteam/1901", "content": "\u0645\u062c\u0645\u0648\u0639\u0629 \u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0646\u0634\u0631\u062a \u0627\u0644\u0643\u062b\u064a\u0631 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a \u0645\u0648\u0642\u0639 \u0646\u0642\u0627\u0628\u0629 \u0627\u0644\u0645\u062d\u0627\u0645\u064a\u0646 \u0648\u0647\u064a \u0643\u0627\u0644\u062a\u0627\u0644\u064a :\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a JQuery \u062c\u064a \u0643\u0648\u064a\u0631\u064a \"\u0645\u0643\u062a\u0628\u0629 \u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u062c\u0627\u0641\u0627 \u0633\u0643\u0631\u064a\u0628\u062a\" \u062a\u062d\u0645\u0644 \u0627\u0644\u0627\u0633\u0645 CVE-2020-11023 \u0644\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u062a\u062d\u0645\u0644 \u0627\u0644\u0627\u0633\u0645 CVE-2020-11022 \u0648\u0647\u064a \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0646\u0635\u064a\u0629 \u0639\u0628\u0631 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 (XSS) \u0641\u064a JQuery . \u064a\u0633\u0645\u062d \u0647\u0630\u0627 \u0627\u0644\u062e\u0644\u0644 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0628\u0627\u0644\u0642\u062f\u0631\u0629 \u0639\u0644\u0649 \u062a\u0648\u0641\u064a\u0631 \u0645\u062f\u062e\u0644\u0627\u062a \u0644\u0648\u0638\u064a\u0641\u0629 \"HTML\" \u0644\u0625\u062f\u062e\u0627\u0644 Javascript \u0641\u064a \u0627\u0644\u0635\u0641\u062d\u0629 \u062d\u064a\u062b \u064a\u062a\u0645 \u0639\u0631\u0636 \u0647\u0630\u0627 \u0627\u0644\u0625\u062f\u062e\u0627\u0644 \u060c \u0648\u062a\u0633\u0644\u064a\u0645\u0647 \u0628\u0648\u0627\u0633\u0637\u0629 \u0627\u0644\u0645\u062a\u0635\u0641\u062d.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u0639\u0645\u0631\u0647\u0627 \u062a\u0633\u0639 \u0633\u0646\u0648\u0627\u062a \u062a\u062d\u062a \u0627\u0633\u0645 CVE-2015-9251 \u064a\u0643\u0648\u0646 jQuery \u0642\u0628\u0644 \u0627\u0644\u0625\u0635\u062f\u0627\u0631 3.0.0 \u0639\u0631\u0636\u0629 \u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0646\u0635\u064a\u0629 \u0639\u0628\u0631 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 (XSS) \u0639\u0646\u062f \u062a\u0646\u0641\u064a\u0630 \u0637\u0644\u0628 Ajax \u0639\u0628\u0631 \u0627\u0644\u0645\u062c\u0627\u0644 \u062f\u0648\u0646 \u062e\u064a\u0627\u0631 dataType\u060c \u0645\u0645\u0627 \u064a\u062a\u0633\u0628\u0628 \u0641\u064a \u062a\u0646\u0641\u064a\u0630 \u0627\u0633\u062a\u062c\u0627\u0628\u0627\u062a \u0646\u0635\u064a\u0629/\u062c\u0627\u0641\u0627 \u0633\u0643\u0631\u064a\u0628\u062a.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 CVE-2019-11358 \u062a\u0633\u0645\u062d \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0641\u064a jQuery \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0628\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u0641\u064a \u0645\u062a\u0635\u0641\u062d \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0625\u0630\u0627 \u0643\u0627\u0646 \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u064a\u0645\u0643\u0646\u0647 \u0627\u0644\u062a\u062d\u0643\u0645 \u0641\u064a \u0628\u0631\u0646\u0627\u0645\u062c \u0645\u0639\u064a\u0646.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 CVE-2021-23445 \u062a\u0645 \u0627\u0644\u0639\u062b\u0648\u0631 \u0639\u0644\u0649 \u062a\u062d\u064a\u064a\u062f \u063a\u064a\u0631 \u0635\u062d\u064a\u062d \u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0625\u062f\u062e\u0627\u0644 \u0641\u064a datatables.net. \u0642\u062f \u062a\u0624\u062f\u064a \u0625\u0644\u0649 \u0627\u0644\u0633\u0645\u0627\u062d \u0628\u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0639\u0627\u0628\u0631\u0629 \u0644\u0644\u0645\u0648\u0627\u0642\u0639 \u0623\u0648 \u0647\u062c\u0648\u0645 \u062d\u0642\u0646 \u0627\u0644\u0646\u0635\u0648\u0635 \u0627\u0644\u0628\u0631\u0645\u062d\u064a\u0629 \u0639\u0628\u0631 \u0645\u0648\u0642\u0639 \u0648\u0633\u064a\u0637 (XSS).\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u0639\u0646 \u0628\u0639\u062f \u062a\u062d\u0645\u0644 \u0627\u0644\u0627\u0633\u0645 CVE-2023-42118\n\n\u0641\u064a \u0627\u0644\u0623\u062e\u064a\u0631 \u0630\u0643\u0631\u062a \u0645\u062c\u0645\u0648\u0639\u0629 One Piece \u0623\u0646 \u0625\u0647\u0627\u0646\u0629 \u0634\u0647\u062f\u0627\u0621 \u0627\u0644\u062c\u0632\u0627\u0626\u0631 \u0645\u0646 \u0627\u0644\u0628\u0639\u0636 \u0644\u064a\u0633\u062a \u0645\u0646 \u0639\u0644\u0627\u0645\u0627\u062a \u0627\u0644\u0631\u062c\u0648\u0644\u0629 \u0648\u0644\u0627 \u0645\u0646 \u0635\u0641\u0627\u062a \u0627\u0644\u0645\u0633\u0644\u0645\u064a\u0646 \u060c \u0644\u0623\u0646 \u0647\u0646\u0627\u0643 \u0647\u062f\u0641 \u0648\u0627\u062d\u062f \u0645\u0634\u062a\u0631\u0643 \u0648\u0647\u0648 \u0627\u0644\u0643\u064a\u0627\u0646 \u0627\u0644\u0635\u06c1\u064a\u0648\u0646\u064a \u0644\u0630\u0627 \u064a\u062c\u0628 \u0627\u0646\u062a\u0628\u0627\u0647 \u062c\u064a\u062f\u0627\u064b \u0644\u0644\u0647\u062f\u0641 \u0627\u0644\u0623\u0633\u0627\u0633\u064a.", "creation_timestamp": "2024-05-30T07:23:02.000000Z"}, {"uuid": "0c87b11d-d7ba-4b0c-845e-ea842800416c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "Telegram/kU7kHp4aeEpuBdZIemSwltxw19S0Tb4eoPjWy-lAZMSYE2U", "content": "", "creation_timestamp": "2024-08-24T22:11:31.000000Z"}, {"uuid": "f4366efe-3893-406e-a7ef-c1dd695c480a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/247", "content": "\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0645\n\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\n\u0625\u0646 \u0634\u0627\u0621 \u0627\u0644\u0644\u0647\n\nMASA DDOS : 0\u20e38\u20e3:0\u20e30\u20e3pm\nTARIKH : 14.MAY.2024\n\nTARGET : https://cacpa.in/\nIP:        209.133.201.83\nHostname:  209-133-201-83.static.hvvc.us\nISP:       HIVELOCITY, Inc.\nASN:       AS29802\nORG:       HIVELOCITY, Inc.\nDomain: hvvc.us | adisol.in | advancegroups.co.in |\nPorts: 21 | 53 | 80 | 110 | 143 | 443 | 465 | 993 | 995 | 2082 | 2083 | 2086 | 2087 |\nHTTP status: 200 | 301 |\nProvider: HIVELOCITY, Inc.\nOrganization: HIVELOCITY, Inc.\nPossible vulnerabilities: cve-2015-9251 | cve-2019-11358 | cve-2020-11022 | cve-2020-11023 |\nGreetz:- All Muslim Hackers\n\n#TengkorakCyberCrew \n#EagleCyberCrew\n#RipperSec\n#KhalifahCyberCrew\n#HelangMerahGroup \n#LaskarPembebasanPalestina\n#TeamCyberAbabil\n#Cyberwar PaLestiNe 3.0\n#TABM MALAYSIA-PALESTINE (MyPA)\n\nCome join us!!\nhttps://t.me/MalaysiaHacktivist\nhttps://t.me/MalaysiaHacktivistz", "creation_timestamp": "2024-05-14T15:27:29.000000Z"}, {"uuid": "ba098acb-0a4e-4d94-8245-125ddf45865f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/RipperSec/2001", "content": "\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0645\n\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\n\u0625\u0646 \u0634\u0627\u0621 \u0627\u0644\u0644\u0647\n\nMASA DDOS : 0\u20e38\u20e3:0\u20e30\u20e3pm\nTARIKH : 14.MAY.2024\n\nTARGET : https://cacpa.in/\nIP:        209.133.201.83\nHostname:  209-133-201-83.static.hvvc.us\nISP:       HIVELOCITY, Inc.\nASN:       AS29802\nORG:       HIVELOCITY, Inc.\nDomain: hvvc.us | adisol.in | advancegroups.co.in |\nPorts: 21 | 53 | 80 | 110 | 143 | 443 | 465 | 993 | 995 | 2082 | 2083 | 2086 | 2087 |\nHTTP status: 200 | 301 |\nProvider: HIVELOCITY, Inc.\nOrganization: HIVELOCITY, Inc.\nPossible vulnerabilities: cve-2015-9251 | cve-2019-11358 | cve-2020-11022 | cve-2020-11023 |\nGreetz:- All Muslim Hackers\n\n#TengkorakCyberCrew \n#EagleCyberCrew\n#RipperSec\n#KhalifahCyberCrew\n#HelangMerahGroup \n#LaskarPembebasanPalestina\n#TeamCyberAbabil\n#Cyberwar PaLestiNe 3.0\n#TABM MALAYSIA-PALESTINE (MyPA)\n\nCome join us!!\nhttps://t.me/MalaysiaHacktivist\nhttps://t.me/MalaysiaHacktivistz", "creation_timestamp": "2024-05-14T14:06:19.000000Z"}, {"uuid": "f59be2a2-6c3b-42e7-ad67-29e98f4d5c36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/HackerNewsAR/1101", "content": "\u0645\u062c\u0645\u0648\u0639\u0629 \u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0646\u0634\u0631\u062a \u0627\u0644\u0643\u062b\u064a\u0631 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a \u0645\u0648\u0642\u0639 \u0646\u0642\u0627\u0628\u0629 \u0627\u0644\u0645\u062d\u0627\u0645\u064a\u0646 \u0648\u0647\u064a \u0643\u0627\u0644\u062a\u0627\u0644\u064a :\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a JQuery \u062c\u064a \u0643\u0648\u064a\u0631\u064a \"\u0645\u0643\u062a\u0628\u0629 \u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u062c\u0627\u0641\u0627 \u0633\u0643\u0631\u064a\u0628\u062a\" \u062a\u062d\u0645\u0644 \u0627\u0644\u0627\u0633\u0645 CVE-2020-11023 \u0644\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u062a\u062d\u0645\u0644 \u0627\u0644\u0627\u0633\u0645 CVE-2020-11022 \u0648\u0647\u064a \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0646\u0635\u064a\u0629 \u0639\u0628\u0631 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 (XSS) \u0641\u064a JQuery . \u064a\u0633\u0645\u062d \u0647\u0630\u0627 \u0627\u0644\u062e\u0644\u0644 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0628\u0627\u0644\u0642\u062f\u0631\u0629 \u0639\u0644\u0649 \u062a\u0648\u0641\u064a\u0631 \u0645\u062f\u062e\u0644\u0627\u062a \u0644\u0648\u0638\u064a\u0641\u0629 \"HTML\" \u0644\u0625\u062f\u062e\u0627\u0644 Javascript \u0641\u064a \u0627\u0644\u0635\u0641\u062d\u0629 \u062d\u064a\u062b \u064a\u062a\u0645 \u0639\u0631\u0636 \u0647\u0630\u0627 \u0627\u0644\u0625\u062f\u062e\u0627\u0644 \u060c \u0648\u062a\u0633\u0644\u064a\u0645\u0647 \u0628\u0648\u0627\u0633\u0637\u0629 \u0627\u0644\u0645\u062a\u0635\u0641\u062d.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u0639\u0645\u0631\u0647\u0627 \u062a\u0633\u0639 \u0633\u0646\u0648\u0627\u062a \u062a\u062d\u062a \u0627\u0633\u0645 CVE-2015-9251 \u064a\u0643\u0648\u0646 jQuery \u0642\u0628\u0644 \u0627\u0644\u0625\u0635\u062f\u0627\u0631 3.0.0 \u0639\u0631\u0636\u0629 \u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0646\u0635\u064a\u0629 \u0639\u0628\u0631 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 (XSS) \u0639\u0646\u062f \u062a\u0646\u0641\u064a\u0630 \u0637\u0644\u0628 Ajax \u0639\u0628\u0631 \u0627\u0644\u0645\u062c\u0627\u0644 \u062f\u0648\u0646 \u062e\u064a\u0627\u0631 dataType\u060c \u0645\u0645\u0627 \u064a\u062a\u0633\u0628\u0628 \u0641\u064a \u062a\u0646\u0641\u064a\u0630 \u0627\u0633\u062a\u062c\u0627\u0628\u0627\u062a \u0646\u0635\u064a\u0629/\u062c\u0627\u0641\u0627 \u0633\u0643\u0631\u064a\u0628\u062a.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 CVE-2019-11358 \u062a\u0633\u0645\u062d \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0641\u064a jQuery \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0628\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u0641\u064a \u0645\u062a\u0635\u0641\u062d \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0625\u0630\u0627 \u0643\u0627\u0646 \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u064a\u0645\u0643\u0646\u0647 \u0627\u0644\u062a\u062d\u0643\u0645 \u0641\u064a \u0628\u0631\u0646\u0627\u0645\u062c \u0645\u0639\u064a\u0646.\n\u2699\ufe0f \u062b\u063a\u0631\u0629 CVE-2021-23445 \u062a\u0645 \u0627\u0644\u0639\u062b\u0648\u0631 \u0639\u0644\u0649 \u062a\u062d\u064a\u064a\u062f \u063a\u064a\u0631 \u0635\u062d\u064a\u062d \u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0625\u062f\u062e\u0627\u0644 \u0641\u064a datatables.net. \u0642\u062f \u062a\u0624\u062f\u064a \u0625\u0644\u0649 \u0627\u0644\u0633\u0645\u0627\u062d \u0628\u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0639\u0627\u0628\u0631\u0629 \u0644\u0644\u0645\u0648\u0627\u0642\u0639 \u0623\u0648 \u0647\u062c\u0648\u0645 \u062d\u0642\u0646 \u0627\u0644\u0646\u0635\u0648\u0635 \u0627\u0644\u0628\u0631\u0645\u062d\u064a\u0629 \u0639\u0628\u0631 \u0645\u0648\u0642\u0639 \u0648\u0633\u064a\u0637 (XSS).\n\u2699\ufe0f \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u0639\u0646 \u0628\u0639\u062f \u062a\u062d\u0645\u0644 \u0627\u0644\u0627\u0633\u0645 CVE-2023-42118\n\n\u0641\u064a \u0627\u0644\u0623\u062e\u064a\u0631 \u0630\u0643\u0631\u062a \u0645\u062c\u0645\u0648\u0639\u0629 One Piece \u0623\u0646 \u0625\u0647\u0627\u0646\u0629 \u0634\u0647\u062f\u0627\u0621 \u0627\u0644\u062c\u0632\u0627\u0626\u0631 \u0645\u0646 \u0627\u0644\u0628\u0639\u0636 \u0644\u064a\u0633\u062a \u0645\u0646 \u0639\u0644\u0627\u0645\u0627\u062a \u0627\u0644\u0631\u062c\u0648\u0644\u0629 \u0648\u0644\u0627 \u0645\u0646 \u0635\u0641\u0627\u062a \u0627\u0644\u0645\u0633\u0644\u0645\u064a\u0646 \u060c \u0644\u0623\u0646 \u0647\u0646\u0627\u0643 \u0647\u062f\u0641 \u0648\u0627\u062d\u062f \u0645\u0634\u062a\u0631\u0643 \u0648\u0647\u0648 \u0627\u0644\u0643\u064a\u0627\u0646 \u0627\u0644\u0635\u06c1\u064a\u0648\u0646\u064a \u0644\u0630\u0627 \u064a\u062c\u0628 \u0627\u0646\u062a\u0628\u0627\u0647 \u062c\u064a\u062f\u0627\u064b \u0644\u0644\u0647\u062f\u0641 \u0627\u0644\u0623\u0633\u0627\u0633\u064a.", "creation_timestamp": "2024-05-30T01:51:17.000000Z"}, {"uuid": "b4308a31-fba8-48e6-aedd-b362db62fc5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/arpsyndicate/664", "content": "#ExploitObserverAlert\n\nCVE-2015-9251\n\nDESCRIPTION: Exploit Observer has 62 entries related to CVE-2015-9251. jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.\n\nFIRST-EPSS: 0.006600000\nNVD-IS: 2.7\nNVD-ES: 2.8", "creation_timestamp": "2023-11-28T15:21:39.000000Z"}, {"uuid": "245f43df-7903-4e15-bda5-877ef0b11906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/KMPteam/1841", "content": "Vulnerable JS Library\n\nCVE-2020-11023 CVE-2020-11022 CVE-2015-9251 CVE-2019-11358\n\nVulnerable JS Library\n\nThe identified library jquery.datatables, version 1.10.25 is vulnerable.\n\nCVE-2021-23445\n\nIP Address\n41.77.117.238\nHostname\nyoussef7.genious.net\nDoH Support\nNo*\n\nA\n41.77.117.238\nAAAA\n41.77.117.238\nCNAME\nayoub.genious.net\nfouad.genious.net\nNS\nv=spf1 +a +mx +ip4:41.77.117.218 +ip4:41.77.117.238 +ip4:41.77.116.234 ~all\n\nExim &lt;= 4.96.2 libspf2 RCE Vulnerability (Sep 2023)\n\nCVE-2023-42118.\n\n\u2699\ufe0fMarrakchi Bar Association:\nhttp://barreaumarrakech.ma\n\nWe do not want to do anything because Morocco is a brotherly country and a brotherly people. We just want to show that we can achieve anything.\nYour insults to the martyrs of Algeria are neither manly nor characteristic of Muslims .\nBecause there is one common goal, which is Israel, so pay close attention to the goal.", "creation_timestamp": "2024-05-29T20:13:05.000000Z"}, {"uuid": "d87c9700-4bad-46d0-b87e-b93c11e9913b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "Telegram/wneec-gwVCaNVEjXa8ywVFWFvTSt2gNNBlFdqbQfxEqbwZ8", "content": "", "creation_timestamp": "2022-06-17T08:49:44.000000Z"}, {"uuid": "b013d076-7aba-49ea-9cf1-e86d6b54838c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3964", "content": "https://162.0.155.35/        GOVERNMENT OF SAINT LUCIA    CVE-2015-9251, CVE-2019-11358, CVE-2020-11022, CVE-2020-11023    Go and give it a try", "creation_timestamp": "2024-03-09T10:54:18.000000Z"}, {"uuid": "503ef608-2f0d-4e64-822e-006bf80d6af7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "Telegram/K90d8xWGmg6xJTe_s9rRIah6fJIEOvWayWqQxZzczLoooGc", "content": "", "creation_timestamp": "2025-02-04T09:16:26.000000Z"}, {"uuid": "a1968cdd-c748-43f4-b1b4-b8b2cd105d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "Telegram/_ntsItegdgsIbF4f9ICsmVGuYA__6KM0MtslEpqsB3-FY4s", "content": "", "creation_timestamp": "2025-02-04T09:13:45.000000Z"}, {"uuid": "62ced676-00e9-4d27-afed-8c8a57febb17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "Telegram/Ygy4ym2m1KO5YYUmOrHL_CIfgrZ0ECzCJieL0DX35USmm2M", "content": "", "creation_timestamp": "2024-11-24T20:19:52.000000Z"}, {"uuid": "3ed0171b-fe11-4a0c-a05c-03542895d11c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/ctinow/165136", "content": "https://ift.tt/AsHKPSN\nCVE-2015-9251 | Oracle WebLogic Server 12.1.3.0.0/12.2.1.3.0 jQuery cross site scripting (BID-105658)", "creation_timestamp": "2024-01-09T17:12:07.000000Z"}, {"uuid": "9fceab89-588f-4688-af4b-193401827d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "published-proof-of-concept", "source": "Telegram/_hR1hflO29UOzrpE6S3LVYhI2puPvd9GkScDGOeX3ZrX5vg", "content": "", "creation_timestamp": "2022-07-12T02:24:07.000000Z"}, {"uuid": "f9f34318-0153-46be-afdb-71c0d00ef535", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "Telegram/wG4dkP5u6oSjRvSjVz74xYl3C9gwqveW4G6MH8jZQJcQSgY", "content": "", "creation_timestamp": "2024-09-04T18:35:08.000000Z"}, {"uuid": "4395ff12-d2ef-4a9f-8e04-da61b28c0f24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "Telegram/xYiMmmFC_xzbKrugFW5u9eKhv-n8QIHkp8V4FgHF4lUk", "content": "", "creation_timestamp": "2024-09-20T10:23:34.000000Z"}]}