Waraxe IT Security Portal
Login or Register
February 8, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 109
Members: 0
Total: 109
Full disclosure
SEC Consult SA-20260202-0 :: Multiple vulnerabilities in Native Instruments Native Access (MacOS)
CyberDanube Security Research 20260119-0 | Authenticated Command Injection in Phoenix Contact TC Router Series
[KIS-2026-03] Blesta <= 5.13.1 (2Checkout) Multiple PHP Object Injection Vulnerabilities
[KIS-2026-02] Blesta <= 5.13.1 (Admin Interface) Multiple PHP Object Injection Vulnerabilities
[KIS-2026-01] Blesta <= 5.13.1 (confirm_url) Reflected Cross-Site Scripting Vulnerability
Username Enumeration - elggv6.3.3
Weak Password Complexity - elggv6.3.3
Paper-Exploiting XAMPP Installations
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
SEC Consult SA-20260126-2 :: UART Leaking Sensitive Data in dormakaba registration unit 9002 (PIN pad)
SEC Consult SA-20260126-1 :: Multiple Critical Vulnerabilities in dormakaba Access Manager
SEC Consult SA-20260126-0 :: Multiple Critical Vulnerabilities in dormakaba Kaba exos 9300
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 5 matches
help how to run php exploits
PostForum:Newbies corner Posted: Thu Oct 16, 2008 4:24 am Subject: help how to run php exploits
anthonis
Replies: 3
Views: 8273




here what i get using from webserver

same i get in cmd :/ http://img366.imageshack.us/img366/6468/59552845ls9.png
IPB <=2.3.5 sql injection widespread!
PostForum:Invision Power Board Posted: Thu Oct 16, 2008 4:17 am Subject: IPB <=2.3.5 sql injection widespread!
anthonis
Replies: 11
Views: 21128




Sad is there any exploit if this one is patched ??? Rolling Eyes
IPB <=2.3.5 sql injection widespread!
PostForum:Invision Power Board Posted: Wed Oct 15, 2008 12:08 pm Subject: IPB <=2.3.5 sql injection widespread!
anthonis
Replies: 11
Views: 21128




when i go to link http://www.***.com/forums/index.php?act=xmlout&do=check-display-name&name=%2527 and there opens only white page and written notfound what it means ??? Very Happy
IPB <=2.3.5 sql injection widespread!
PostForum:Invision Power Board Posted: Wed Oct 15, 2008 11:50 am Subject: IPB <=2.3.5 sql injection widespread!
anthonis
Replies: 11
Views: 21128




if i get reply notfound from the link what i have to do ???
help how to run php exploits
PostForum:Newbies corner Posted: Wed Oct 15, 2008 6:34 am Subject: help how to run php exploits
anthonis
Replies: 3
Views: 8273




hi all
well i am using serv2008 i have installed xamp and wamp, i have active perl too, php....
perl exploits run fine but php....
ok so i download any php exploit, well lets as example take ipb e ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.035 Seconds