Waraxe IT Security Portal
Login or Register
June 16, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 46
Members: 0
Total: 46
Full disclosure
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0
ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
Local information disclosure in apport and systemd-coredump
Stored XSS via File Upload - adaptcmsv3.0.3
IDOR "Change Password" Functionality - adaptcmsv3.0.3
Stored XSS "Send Message" Functionality - adaptcmsv3.0.3
Authenticated File Upload to RCE - adaptcmsv3.0.3
Stored XSS in "Description" Functionality - cubecartv6.5.9
Multiple Vulnerabilities in SAP GuiXT Scripting
CVE-2024-47081: Netrc credential leak in PSF requests library
Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 33 matches
l
PostForum:PhpBB Posted: Tue Apr 18, 2006 6:47 pm Subject: l
syntax9
Replies: 25
Views: 50562




nice hijack. but for the original post, oobiin is looking at the same targetas iam. ill match whatever he offers, so the reward is dbl'd.
Question about XSS Remote Cookie Disclosure Exploiting
PostForum:PhpBB Posted: Tue Apr 18, 2006 6:45 pm Subject: Question about XSS Remote Cookie Disclosure Exploiting
syntax9
Replies: 4
Views: 9431




beastyarny if you know of a way with .18 / .19 with the new indentifier please let me know, ive been trying for months on a certain site and i always get the same cookies with the decial. 31 bit hash.
phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
PostForum:PhpBB Posted: Sat Mar 18, 2006 8:46 am Subject: phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
syntax9
Replies: 19
Views: 55777




there is no password there, the user doesnt have autolog in checked.

you need to retry and get some1 else that does use autologin
phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
PostForum:PhpBB Posted: Tue Mar 14, 2006 9:27 pm Subject: phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
syntax9
Replies: 19
Views: 55777




the code is for phpbb, never tried it with phpnuke.
How to hack phpBB forum if you dont know what version is it?
PostForum:PhpBB Posted: Mon Mar 13, 2006 2:44 pm Subject: How to hack phpBB forum if you dont know what version is it?
syntax9
Replies: 5
Views: 22577




should not really post URL's..

try exploits on the site..
at least attempt to exploit it with all versions. work with 2.019 and work backwards.
l
PostForum:PhpBB Posted: Sun Feb 12, 2006 11:53 am Subject: l
syntax9
Replies: 25
Views: 50562




check your pm's ><
exploit for 2.0.17
PostForum:PhpBB Posted: Thu Feb 09, 2006 9:33 pm Subject: exploit for 2.0.17
syntax9
Replies: 4
Views: 10620




><...
all of them do it minus like 2...
exploit for 2.0.17
PostForum:PhpBB Posted: Wed Feb 08, 2006 11:51 pm Subject: exploit for 2.0.17
syntax9
Replies: 4
Views: 10620




u didnt serach very hard considering a working explit for 2.0.17 is posted on PAGE 1 of PhpBB forums, on this EXACT page.

><
phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
PostForum:PhpBB Posted: Tue Feb 07, 2006 12:19 am Subject: phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
syntax9
Replies: 11
Views: 28138




phpBB Style Changer/Demo Mod-->GET HASH EXPLOIT


is why, didnt read the comment.
phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
PostForum:PhpBB Posted: Tue Feb 07, 2006 12:01 am Subject: phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
syntax9
Replies: 11
Views: 28138




doesnt work for me on any forums i have tried.
phpBB 2.0.19 search.php and profile.php DOS Vulnerability
PostForum:PhpBB Posted: Sat Feb 04, 2006 1:09 am Subject: phpBB 2.0.19 search.php and profile.php DOS Vulnerability
syntax9
Replies: 4
Views: 12289




works but so pointless in my eyes.
id rather get an admin password and dump the sql than dos the site.
Hash
PostForum:PhpBB Posted: Fri Feb 03, 2006 11:52 am Subject: Hash
syntax9
Replies: 4
Views: 13977




how do you get it? use a XSS cookie stealer.

once you get it crack it with a MD5 rainbow table, IE plain-text.info or milw0rm.com
phpBB <= 2.0.18 Remote XSS Cookie Disclosure Exploit
PostForum:PhpBB Posted: Tue Jan 31, 2006 11:41 pm Subject: phpBB <= 2.0.18 Remote XSS Cookie Disclosure Exploit
syntax9
Replies: 1
Views: 10176




/******************************************************************

phpBB <= 2.0.18 XSS Cookie Disclosure Proof of Concept
-- 'the html is on exploit'

original exploit by: Maksymilian Arcie ...
phpBB <= 2.0.18 Remote Dictionary Attack Tool
PostForum:PhpBB Posted: Tue Jan 31, 2006 11:41 pm Subject: phpBB <= 2.0.18 Remote Dictionary Attack Tool
syntax9
Replies: 8
Views: 13611




# Will be moved to tools section when completed. /str0ke

#!/usr/bin/perl
############################################
# Credits: Weakness and Xploit by DarkFig
# Affected ...
phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
PostForum:PhpBB Posted: Tue Jan 31, 2006 11:40 pm Subject: phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
syntax9
Replies: 19
Views: 55777




# to be used with cookie stealer located here: http://www.milw0rm.com/id.php?id=1103
# Make sure you change www.milw0rm.com to your domain. thnx. /str0ke
# Author: threesixthousan

/*
As long as ...
Page 1 of 3 Goto page 1, 2, 3Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.042 Seconds