![]() |
IPB 2.16 exploits
Hello I just came across your forum and while I was reading the russian part it ,I noticed an Xss exploit in IPB 2.16. Furthemore, I was interested to know , but I was not able to fully understand your explanation. Please, I would be greatful if you support english translation to this xss exploit in this thread http://forum.antichat.ru/threadnav17358-6-10.html
However I was not able to understand what this exploit effect is? |
you can get the cookie files of the administrator... but.. that wont give nothing special... the thing is that you must put an javascript code to the meta data of a picture and put it like an avatar... but it works only for IE
|
Ok thanks . Are there other exploits for IPB 2.16, that have greater effect currently?
|
2.1.6 sploit is now on public use :
http://forum.antichat.ru/showpost.php?p=174952&postcount=19 |
| Время: 14:08 |