Imagevue.v2.8.9 Multi Vulnerability

2018.03.10
dz indoushka (DZ) dz
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- | # Title : Imagevue.v2.8.9 Multi Vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on: windows 8.1 Français V.(Pro) | # Download : http://www.dl.persianscript.ir/script/Imagevue.v2.8.9.PHP.NULL-DGT(PersianScript.ir).rar ============================================================================================================= App Msg Error : http://public.te.ua/validator.php Xss : This vulnerability affects /Imagevue/imagevue.php URL encoded GET input stylesheet was set to color.css_999988'():;933560 The input is reflected inside <script> tag between single quotes. Passwodr Disclosure : In the case of the protection of a folder or the site with a password you can Find encrypted Type SHA-1 her http://www.royalshow.co.za/old/gallery/content/folders.xml Phpinfo : http://royalshow.co.za/old/gallery/iv-includes/phpinfo.php vul web site : http://public.te.ua/iv-admin/ default pass and user admin/admin Greetz : jericho http://attrition.org & http://www.osvdb.org/ * packetstormsecurity.com * http://is-sec.org/cc/ Hussin-X * Stake (www.v4-team.com) * D4NB4R * ViRuS_Ra3cH * yasMouh * https://www.corelan.be * exploit4arab.net ---------------------------------------------------------------------------------------------------------------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top