Have an account?
It looks like you're new here. If you want to get involved, click one of these buttons!
Apply for Membership
Who's Online (1)
Looking to introduce yourself? Look no further, and click here! We also have IRC! [irc.evilzone.org #iexploit]
Format string overflows(Plus more)
You are NOT the author of this, i seen this down at Exploit-db, why cant you just give credit, your not that knowledgeable on overflows anyways, unless you want to prove me wrong? -Chosen-
Try to banner grab and find the running version so you can exploit it. You probably go this results from an NMAP scan, and i dont think you can exploit this. This only means that the root password of the database was not changed. You can try to use…
Hileytech CMS Persistent XSS vulnerability
It really isnt difficult at all to find these XSS vulnerabilities. http://220.127.116.11/whois/lookup.php?d ... /script%3E -Chosen-