Waraxe IT Security Portal
Login or Register
March 11, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 55
Members: 0
Total: 55
Full disclosure
SEC Consult SA-20250226-0 :: Multiple vulnerabilities in Siemens A8000 CP-8050 & CP-8031 PLC
Re: MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client
MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client
Self Stored XSS - acp2sev7.2.2
Python's official documentation contains textbook example of insecure code (XSS)
Re: Netgear Router Administrative Web Interface Lacks Transport Encryption By Default
Monero 18.3.4 zero-day DoS vulnerability has been droppedpublicly on social network.
Netgear Router Administrative Web Interface Lacks Transport Encryption By Default
[CVE-2024-54756] GZDoom <= 4.13.1 Arbitrary Code Execution viaMalicious ZScript
Re: Text injection on https://www.google.com/so rry/index via ?q parameter (no XSS)
SEC Consult SA-20250211-0 :: Multiple vulnerabilities in Wattsense Bridge
APPLE-SA-02-10-2025-2 iPadOS 17.7.5
APPLE-SA-02-10-2025-1 iOS 18.3.1 and iPadOS 18.3.1
CVE-2024-55447: Access Control in Paxton Net2 software (update)
ChatGPT AI finds "security concern" (XSS) in DeepSeek's code
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 8 matches
phpbb 2.0.21: A PoC exploit to change Avatar file location
PostForum:Newbies corner Posted: Tue Aug 26, 2008 6:29 pm Subject: phpbb 2.0.21: A PoC exploit to change Avatar file location
c2java
Replies: 10
Views: 15045




thanks, i appreciate it alot
phpbb 2.0.21: A PoC exploit to change Avatar file location
PostForum:Newbies corner Posted: Mon Aug 25, 2008 6:17 am Subject: phpbb 2.0.21: A PoC exploit to change Avatar file location
c2java
Replies: 10
Views: 15045




thanks alot but i still cant quite grasp how to choose where to upload the file..
phpbb 2.0.21: A PoC exploit to change Avatar file location
PostForum:Newbies corner Posted: Sun Aug 24, 2008 5:31 pm Subject: phpbb 2.0.21: A PoC exploit to change Avatar file location
c2java
Replies: 10
Views: 15045




im trying the exploit on my own forum before the actual attack
phpbb 2.0.21: A PoC exploit to change Avatar file location
PostForum:Newbies corner Posted: Sun Aug 24, 2008 8:39 am Subject: phpbb 2.0.21: A PoC exploit to change Avatar file location
c2java
Replies: 10
Views: 15045




could be, but as i said i am entering admin user and pass and it still doesnt work
phpbb 2.0.21: A PoC exploit to change Avatar file location
PostForum:Newbies corner Posted: Sat Aug 23, 2008 6:42 pm Subject: phpbb 2.0.21: A PoC exploit to change Avatar file location
c2java
Replies: 10
Views: 15045




nope, i dont know perl but i can still tell that you need 5 arguments (although i dont use the 5th as you might have noticed coz it gives me errors, i'd like some1 to lighten my mind on this one, i us ...
phpbb 2.0.21: A PoC exploit to change Avatar file location
PostForum:Newbies corner Posted: Sat Aug 23, 2008 1:21 pm Subject: phpbb 2.0.21: A PoC exploit to change Avatar file location
c2java
Replies: 10
Views: 15045




http://www.milw0rm.com/exploits/2348
im asking for a detailed explanation on how to use this thing. im trying to run it with these arguments selecting my own 2.0.21 phpbb forum as the victim:
perl p ...
php script injection into exif of a .jpg file; how-to
PostForum:Newbies corner Posted: Sun Aug 17, 2008 5:06 pm Subject: solved it
c2java
Replies: 1
Views: 5987




nevermind, i found out that the best tool for that is edjpgcom.
php script injection into exif of a .jpg file; how-to
PostForum:Newbies corner Posted: Sun Aug 17, 2008 10:53 am Subject: php script injection into exif of a .jpg file; how-to
c2java
Replies: 1
Views: 5987




http://www.milw0rm.com/exploits/2348
how exactly do i inject my script into the exif portion of the file?
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.041 Seconds