Waraxe IT Security Portal
Login or Register
January 29, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 87
Members: 0
Total: 87
Full disclosure
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
SEC Consult SA-20260126-2 :: UART Leaking Sensitive Data in dormakaba registration unit 9002 (PIN pad)
SEC Consult SA-20260126-1 :: Multiple Critical Vulnerabilities in dormakaba Access Manager
SEC Consult SA-20260126-0 :: Multiple Critical Vulnerabilities in dormakaba Kaba exos 9300
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
OpenMetadata <= 1.11.3 Authenticated SQL Injection
[REVIVE-SA-2026-001] Revive Adserver Vulnerabilities
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction
TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
TinyOS 2.1.2 printfUART Global Buffer Overflow via UnboundedFormat Expansion
KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 10 matches
phpnuke trojaned scripts.
PostForum:PhpNuke Posted: Wed Jun 16, 2004 1:05 am Subject: phpnuke trojaned scripts.
b0ilz
Replies: 3
Views: 12213




It seems someone has trojaned alot of phpnuke scripts about 6 months ago. It seems these trojans are still in the wild today. It seems like all you fuckers running phpnuke are fucking gimps. fish i ...
How secure is Cpanel?
PostForum:MySql Posted: Wed Jun 16, 2004 12:59 am Subject: How secure is Cpanel?
b0ilz
Replies: 11
Views: 24854




btw, these a-squad.com guys are retards. rm them with no remorse.
How secure is Cpanel?
PostForum:MySql Posted: Wed Jun 16, 2004 12:55 am Subject: How secure is Cpanel?
b0ilz
Replies: 11
Views: 24854




This is from <!--
# PROGRAM: cpanel.php
# AUTHORS: Rob Brown (rob@asquad.com)
# PURPOSE: Detect possible vulnerabilities
#
# DISCLAIMER:
# THIS PROGRAM IS FOR EDUCATIO ...
Few Questions about XSS
PostForum:Cross-site scripting aka XSS Posted: Fri Jun 04, 2004 7:47 am Subject: Few Questions about XSS
b0ilz
Replies: 5
Views: 15115




Dont forget that you dont need to put any real javascript on the website. You can use remote scripts by using the src= attribute in many different methods. Also, javascript is not the only language ...
How secure is Cpanel?
PostForum:MySql Posted: Fri Jun 04, 2004 7:30 am Subject: How secure is Cpanel?
b0ilz
Replies: 11
Views: 24854




There was a remote root vuln in cpanel. And I saw over 5 exploits for it in under a day. Many boxes were rooted that week. Cpanel has a simple to use update feature, which saved alot of admin's ass ...
Tutorials and whitepapers about cross-site scripting
PostForum:Cross-site scripting aka XSS Posted: Mon May 31, 2004 6:52 am Subject: Tutorials and whitepapers about cross-site scripting
b0ilz
Replies: 5
Views: 26939




Of all the xss papers out there you decide to link mine. Thanks I guess.

But this paper is very outdated. It was written in I think 2001, when xss was very new. XSS came out in 2000 I believe, i ...
secure nuke_authors
PostForum:Sql injection Posted: Mon May 31, 2004 5:10 am Subject: secure nuke_authors
b0ilz
Replies: 4
Views: 13007




/**/UN/**/ION will only work with some databases to evade this. mySQL treats /**/ as a field seporator. So this will not work.

as for the check. it is flawed as waraxe stated. Also, checking fo ...
What's bad about XSS?
PostForum:Cross-site scripting aka XSS Posted: Mon May 31, 2004 4:51 am Subject: What's bad about XSS?
b0ilz
Replies: 7
Views: 18113




here is post from text avaliable at There are almost unlimited ways javascript can be used to make an attack. For more ways look at the thread in bugtraq started on Mar 16 2002 by zeroboy@arrakis.es ...
Posion null byte TM
PostForum:All other security holes Posted: Mon May 31, 2004 4:39 am Subject: Posion null byte TM
b0ilz
Replies: 1
Views: 8942




Olaf Kirch came up with the term "poison null byte". RFP just used this term in his article.
Hackers/Crackers Mentality
PostForum:General discussion Posted: Mon May 31, 2004 4:35 am Subject: Hackers/Crackers Mentality
b0ilz
Replies: 5
Views: 13517




I think most hackers care more for shell access than admin access. Once they have this they might touch files which hold login, network, and command logs. They will probably also try to download exp ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.022 Seconds