Waraxe IT Security Portal
Login or Register
April 16, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 376
Members: 0
Total: 376
Full disclosure
CyberDanube Security Research 20260408-1 | Multiple Vulnerabilities in Siemens SICAM A8000
CyberDanube Security Research 20260408-0 | Remote Operation Denial of Service in Siemens SICAM A8000
SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS
SEC Consult SA-20260401-0 :: Broken Access Control in OpenWebUI
SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library
Apple OHTTP Relay: 14 Third-Party Endpoints, 6 Countries,Zero User Visibility
[KIS-2026-06] MetInfo CMS <= 8.1 (weixinreply.class.php) PHP Code Injection Vulnerability
[CVE-2026-33691] OWASP CRS whitespace padding bypassvulnerability
APPLE-SA-03-24-2026-10 Xcode 26.4
APPLE-SA-03-24-2026-9 Safari 26.4
APPLE-SA-03-24-2026-8 visionOS 26.4
APPLE-SA-03-24-2026-7 watchOS 26.4
APPLE-SA-03-24-2026-6 tvOS 26.4
APPLE-SA-03-24-2026-5 macOS Sonoma 14.8.5
APPLE-SA-03-24-2026-4 macOS Sequoia 15.7.5
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 8 matches
MYSQL Injections(In PHP) - Vulnerability Check
PostForum:Sql injection Posted: Wed Sep 13, 2006 3:50 pm Subject: MYSQL Injections(In PHP) - Vulnerability Check
trace
Replies: 8
Views: 17681




Like this:
http://dukemednews.duke.edu/av/video.php?id=5115/**/and/**/1=1/*
http://dukemednews.duke.edu/av/video.php?id=5115/**/and/**/1=2/*
http://dukemednews.duke.edu/av/video.php?id=5115/**/and/ ...
Blind SQL Injection question
PostForum:Sql injection Posted: Wed Sep 13, 2006 3:26 pm Subject: Blind SQL Injection question
trace
Replies: 2
Views: 11906




Introduction

The World Wide Web has experienced remarkable growth in recent years. Businesses, individuals, and governments have found that web applications can offer effective, efficient and relia ...
StealthRedneck's Hack & Crack Pack
PostForum:Tools Posted: Sun Jun 18, 2006 7:33 pm Subject: StealthRedneck's Hack & Crack Pack
trace
Replies: 4
Views: 26705




It looks like that it is very large
hack Invision Gallery
PostForum:Sql injection Posted: Sat May 20, 2006 11:44 am Subject: hack Invision Gallery
trace
Replies: 1
Views: 9425




I have the same thinking all the way...
Use XSS To Get Aspshell
PostForum:Cross-site scripting aka XSS Posted: Wed May 17, 2006 1:25 am Subject: Re: Use XSS To Get Aspshell
trace
Replies: 1
Views: 13577




hey all... I come from china n this is my frist time to wirte article in
english,so forgive my english.
i hope this page can help u.

so far as i know there r many forums hv function about add adm ...
SQL Injection Scanner
PostForum:Sql injection Posted: Wed May 17, 2006 12:46 am Subject: Re: SQL Injection Scanner
trace
Replies: 4
Views: 19530




yes ,vulnerabilityscanner3.0 can scan some sql/php injection exploit


I think so.
PhpBB <= 2.0.20 Admin/Restore Database remote cmmnds xctn
PostForum:PhpBB Posted: Wed May 17, 2006 12:43 am Subject: PhpBB <= 2.0.20 Admin/Restore Database remote cmmnds xctn
trace
Replies: 24
Views: 49664




Thanks for sharing, although I dont's know how to use it to a nicety
I need SQL Injection Exploit tool
PostForum:Sql injection Posted: Wed May 17, 2006 12:26 am Subject: I need SQL Injection Exploit tool
trace
Replies: 6
Views: 18374




I have some tools have to do with SQLinjector,but those writen by chinaese.
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.033 Seconds