Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
April 19, 2014
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: Lokesh
New Today: 0
New Yesterday: 0
Overall: 8982

People Online:
Visitors: 239
Members: 0
Total: 239
milw0rm
·[web applications] - RunCMS 1.6.1 - (pm.class.php) Multiple SQL Injection Vulnerabilities
·[web applications] - csUpload Script Site - Authentication Bypass Vulnerability
·[web applications] - QuickCms 5.4 - Multiple Vulnerabilites
·[dos / poc] - Heartbleed User Session Extraction Exploit
·[dos / poc] - Asterisk 1.x - BYE Message Remote Denial of Service Vulnerability
·[remote exploits] - Vtiger Install Unauthenticated Remote Command Execution Exploit
·[remote exploits] - MS14-017 Microsoft Word RTF Object Confusion Exploit
·[remote exploits] - BlackBerry Z 10 Buffer Overflow Vulnerability
·[remote exploits] - Sun Java Runtime Environment 1.6 - WebStart JNLP File Stack Buffer Overflow
·[remote exploits] - GSC Client 1.00 2067 - Privilege Escalation Vulnerability

read more...
PacketStorm News
·FreeBSD Security Advisory - OpenSSL Issues
·FreeBSD Security Advisory - NFS Server Deadlock
·Cisco Security Advisory 20140409-asa
·Cisco Security Advisory 20140409-heartbleed
·Mandriva Linux Security Advisory 2014-067
·Slackware Security Advisory - openssl Updates
·Red Hat Security Advisory 2014-0380-01
·Red Hat Security Advisory 2014-0389-01
·Red Hat Security Advisory 2014-0383-01
·Red Hat Security Advisory 2014-0382-01

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 9 matches
exploit and patch php-nuke 7.4
PostForum: Cross-site scripting aka XSS   Posted: Thu Oct 07, 2004 1:20 pm   Subject: exploit and patch php-nuke 7.4
Tora
 
Replies: 4
Views: 3081




Hi Very Happy

i think this exploit is very old....?

http://www.waraxe.us/?modname=sa&id=018
Caution, fortress & co are useless
PostForum: PhpNuke   Posted: Sun Jun 06, 2004 4:00 pm   Subject: Caution, fortress & co are useless
Tora
 
Replies: 5
Views: 2336




Script Kiddie
Question Question Who is the script kiddie Question Question
Caution, fortress & co are useless
PostForum: PhpNuke   Posted: Sun Jun 06, 2004 10:11 am   Subject: Caution, fortress & co are useless
Tora
 
Replies: 5
Views: 2336




Here are 3 examples from our detection log files:
request:
_GETrequest:
_GETrequest:
_GET
As you can see, the hackers do not attack over the URL. They dispatch
the data over a form by using Post ...
New security flaws in phpnuke all versions!
PostForum: PhpNuke   Posted: Sun Jun 06, 2004 9:33 am   Subject: New security flaws in phpnuke all versions!
Tora
 
Replies: 13
Views: 5872




is nonsense in all of the not directly accessed scripts by my opinion, because mainfile is allready processed in index.php,admin.php or modules.php . Just useless piece of code... , or am i wrong? An ...
Few Questions about XSS
PostForum: Cross-site scripting aka XSS   Posted: Thu Jun 03, 2004 8:04 am   Subject: Few Questions about XSS
Tora
 
Replies: 5
Views: 2916




Hi Smile

thats the effect from the php cofiguration "magic_quotes_gpc"

The magic_quotes_gpc configuration directive affects Get, Post and Cookie values. If turned on, value (It's "PHP!") will autom ...
What's bad about XSS?
PostForum: Cross-site scripting aka XSS   Posted: Tue May 25, 2004 7:11 pm   Subject: What's bad about XSS?
Tora
 
Replies: 7
Views: 4643




Hi Smile

Example:
on a phpNuke page you can steal the cookie from the Admin.
In this Cookie is the password-hash includet.
With this hash you can manipulate an own cookie and login as Admin on this ...
Waraxe Becoming Popular
PostForum: Fun corner   Posted: Mon May 24, 2004 11:54 am   Subject: Waraxe Becoming Popular
Tora
 
Replies: 3
Views: 2747




wow, realy great http://www.maax-design.de/modules/eBoard/images/smilies/schildschlagen.gif
[waraxe-2004-SA#015] NukeCalendar v1.1.a
PostForum: How to fix   Posted: Mon May 24, 2004 11:31 am   Subject: [waraxe-2004-SA#015] NukeCalendar v1.1.a
Tora
 
Replies: 3
Views: 3002




thx for your realy great work Very Happy

Do you know my little nuke 'critical review'?
http://vkp.shiba.de/doku/fortress.htm

Sorry, only in german language...
[waraxe-2004-SA#015] NukeCalendar v1.1.a
PostForum: How to fix   Posted: Mon May 24, 2004 8:50 am   Subject: [waraxe-2004-SA#015] NukeCalendar v1.1.a
Tora
 
Replies: 3
Views: 3002




Hi Smile

I'm the author of this module, thx for your advises Razz

But i think, you don't test the original download from my page. Because the files "block-Calendar.php", "block-Calendar1.php" and " ...
Page 1 of 1
All times are GMT
  




Powered by phpBB 2001-2008 phpBB Group






All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.107 Seconds