exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Autogalleryv0.41.txt

Autogalleryv0.41.txt
Posted Apr 12, 2006
Site elitemexico.org

Autogallery v0.41 suffers from multiple XSS vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 8f60a89be9e855d2ddf27a907a6c2c6fd8dffd0a13f8317c2870f044c3735424

Autogalleryv0.41.txt

Change Mirror Download
------=_Part_19029_2274933.1144804602299
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

###########################################################################
# Advisory #12 Title: Autogallery Multiple Cross-Site Scripting
Vulnerabilitie
#
#
# Author: 0o_zeus_o0 ( Arturo Z. )
# Contact: zeus@diosdelared.com
# Website: www.elitemexico.org
# Date: 11/04/06
# Risk: Medium
# Vendor Url: http://gallery.mrvanes.com/about.html
# Affected Software: Autogallery v0.41
# Non Affected:
#
#Info:
##################################################################
#this bug causing the robbery of cookie
#
#Example XSS:
##################################################################
#
#http://www.vuln.com/[path]/index.php?show=3Dmisc&pic=3D">[XSS]
#
#http://www.vuln.com/[path]/index.php?show=3D">[XSS]
#
##################################################################
#
#Solution:
##################################################################
#
#
#VULNERABLE VERSIONS
##################################################################
#v0.41
#
##################################################################
#Contact information
#0o_zeus_o0
#zeus@diosdelared.com
#www.elitemexico.org
##################################################################
#greetz: lady fire,Mi beba, olimpus klan team and elitemexico
#
# original advisorie: http://www.elitemexico.org/12.txt
##################################################################

------=_Part_19029_2274933.1144804602299
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

###########################################################################=
<br># Advisory #12 Title: Autogallery Multiple Cross-Site Scripting Vulnera=
bilitie<br># <br># <br># Author: 0o_zeus_o0 ( Arturo Z. )<br># Contact:=20
<a href=3D"mailto:zeus@diosdelared.com">zeus@diosdelared.com</a><br># Websi=
te: <a href=3D"http://www.elitemexico.org">www.elitemexico.org</a><br># Dat=
e: 11/04/06<br># Risk: Medium<br># Vendor Url: <a href=3D"http://gallery.mr=
vanes.com/about.html">
http://gallery.mrvanes.com/about.html</a><br># Affected Software: Autogalle=
ry v0.41 <br># Non Affected: <br>#<br>#Info:<br>###########################=
#######################################<br>#this bug causing the robbery of=
cookie
<br>#<br>#Example XSS: <br>################################################=
##################<br>#<br>#http://www.vuln.com/[path]/index.php?show=3Dmis=
c&pic=3D">[XSS]<br>#<br>#http://www.vuln.com/[path]/index.php?s=
how=3D">[XSS]
<br>#<br>##################################################################=
<br>#<br>#Solution:<br>####################################################=
##############<br>#<br>#<br>#VULNERABLE VERSIONS<br>#######################=
###########################################
<br>#v0.41 <br>#<br>#######################################################=
###########<br>#Contact information<br>#0o_zeus_o0<br>#zeus@<a href=3D"http=
://diosdelared.com">diosdelared.com</a><br>#www.elitemexico.org<br>########=
##########################################################
<br>#greetz: lady fire,Mi beba, olimpus klan team and elitemexico<br># <br>=
# original advisorie: <a href=3D"http://www.elitemexico.org/12.txt">http://=
www.elitemexico.org/12.txt</a><br>#########################################=
#########################

------=_Part_19029_2274933.1144804602299--

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close