-
Recently found and leaked exploit by "1F98D" seem to lead to directory traversal. I am not able to test it now, but users should be reported.
https://www.exploit-db.com/exploits/47956
-
**Describe the bug**
"Host Header Injection" i can inject host in by Get any website i want .
**To Reproduce**
Steps to reproduce the behavior:
1. go to backend login [http://172.26.0.2/index…
-
Hi @proditis ,
i found **XSS** in backend (echoCTF Management interface)
**Steps To Reproduce:**
1. Go to 'http://localhost:8082/index.php?r=frontend/player/create'
2. Click on 'Create Playe…
-
Hey @proditis :wave: ,
There's a XSS has been found in the **backend** this vulnerability has been affecting the **frontend**.
**Steps To Reproduce:**
1. Go to 'http://localhost:8082/index.ph…
-
Reported on our discord by https://echoctf.red/profile/1653099
![image](https://user-images.githubusercontent.com/4373752/174251475-9f130b43-2904-4aea-a29b-97ff8a332766.png)
-
There are some cases that cause initialization errors on the db docker container due to `Illegal mix of collations`.
This was reported by @EtheriousNight at https://github.com/echoCTF/echoCTF.RED/…
-
**Describe the bug**
Every page except the homepage throws an "404 Page not Found"-Error after a reboot of the machine or the docker container. The Backend is working absolutly fine.
**To Reproduc…
-
* [x] Add `ncp-ciphers` (for openvpn 2.4.x) and `data-ciphers` (for openvpn 2.5.x) on client and server
* [x] Enable (or disable) openvpn compression (needs a bit of researching first)
* [x] Make ov…
-
Display the writeups the user wrote for any challenge or a target on the user's profile **`https://echoctf.red/profile/me`**
, with `Challenges solved` & `Headshots` ...
0xRar updated
2 years ago
-
Hi Team,
I am facing issues after manual installation, I followed this step https://echoctfred.readthedocs.io/INSTALL-LINUX/ and got an error after the installation was completed when opened the fr…