[39675] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [HSC Security Group] Invision PowerBoard 1.3.x - 2-x Exploit

daemon@ATHENA.MIT.EDU (augustusx00@gmail.com)
Sat Jul 16 20:10:45 2005

Date: 16 Jul 2005 23:37:13 -0000
Message-ID: <20050716233713.7903.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: augustusx00@gmail.com
To: bugtraq@securityfocus.com

Isn't that the same code as this, but with the credits ripped?

http://www.milw0rm.com/id.php?id=1013

Also, your "discovery" is _OLD_ news.

http://forums.invisionpower.com/index.php?showtopic=168016

I see hackerscenter.com uses Invision Power Board. If you guys are just now finding out about this exploit then you may want to start investigating your server logs. Anyway, thanks hackerscenter.com for another l33t advisory! :-D

home help back first fref pref prev next nref lref last post