![Waraxe IT Security Portal](themes/Helius/images/logo.jpg) |
|
![](themes/Helius/images/7px.gif) |
![](themes/Helius/forums/images/top_left.gif) |
Menu |
![](themes/Helius/forums/images/top_right.gif) |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
![](themes/Helius/forums/images/top_left.gif) |
User Info |
![](themes/Helius/forums/images/top_right.gif) |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 199
Members: 0
Total: 199
|
|
|
|
|
![](themes/Helius/forums/images/top_left.gif) |
Full disclosure |
![](themes/Helius/forums/images/top_right.gif) |
|
|
![](themes/Helius/images/top_left.gif) |
|
![](themes/Helius/images/top_right.gif) |
![](themes/Helius/forums/images/logo1.gif) |
|
![](themes/Helius/forums/images/logo2.gif) |
IT Security and Insecurity Portal |
|
|
Dora |
|
Replies: 2 |
Views: 10474 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
B. Remote Code Execution
B1. The simple hack made to the Cache_library
makes mambo vulnerable to a
remote arbitrary code execution attacks.
Example :
Code:
http://<site-with-mam ... |
|
|
|
Dora |
|
Replies: 8 |
Views: 46707 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
To linux :
Could you share me this php shell scipts again ?
I get a error :
Fatal error: Call to undefined function posix_getuid() in /DISK2/WWW/nhoveem.ws/www/shell.php on line 5 |
|
|
|
Dora |
|
Replies: 1 |
Views: 10565 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
I read a bug below :
phpBB Group phpBB2 Arbitrary File Unlink Vulnerability
iDEFENSE Security Advisory 02.22.05
www.idefense.com/application/poi/display?id=205&type=vulnerabilities
Febru ... |
|
|
|
Dora |
|
Replies: 5 |
Views: 15834 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
I search */index.php?name=PNphpBB2 at altavista any file many site but your exploit may be not word .
Pls tell me more detail about this bug
Thank |
|
|
|
Dora |
|
Replies: 1 |
Views: 8288 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
I read xploit in nukie 7.6
URL
modules.php?name=Downloads&d_op=NewDownloads&newdownloadshowdays=[xss code here]
as waraxe say PHp-nuke have some coutermeasures against trivial xss atta ... |
|
|
|
Dora |
|
Replies: 0 |
Views: 6958 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
I have just found a bug and exploit of paFileDB Version 3.1
Code:
============================
Security REPORT paFileDB 3.1
============================
Product: paFileDB Version 3.1 ... |
|
|
|
Dora |
|
Replies: 0 |
Views: 7348 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
Frist , let visit http://vnonlines.com/diendan/
And login with user : Dora and pass : 1111
After that , try to browse this link :
http://vnonlines.com/download/pafiledb.php?action=email&i ... |
|
|
|
Dora |
|
Replies: 1 |
Views: 9376 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
I know there is a way to view the structure of Dir and file on Server using remview.php scripts .
Who can discrible the detail way of using this script for me ?
Thank a lot |
|
|
|
Dora |
|
Replies: 0 |
Views: 7316 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
I try to browse this URL : http://www.oitinhyeu.de/diendan/index.php?act=Arcade&cat=-1%20UNION%20SELECT%200,0,legacy_password,id,name,0,0,0,0,0,0,0,0,0,0,0,0,0%20FROM%20ibf_members%20
And i get ... |
|
|
|
Dora |
|
Replies: 0 |
Views: 7384 |
|
|
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/spacer.gif) |
![](themes/Helius/forums/images/post_corner.gif) |
|
I have just found a bug and exploit of paFileDB Version 3.1
============================
Security REPORT paFileDB 3.1
============================
Product: paFileDB Version 3.1 (and ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|