Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
January 27, 2020
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 245
Members: 1
Total: 246

Online Now:
01: david - Homepage
PacketStorm News
Currently there is a problem with headlines from this site
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 8 matches
open your eyes
PostForum: Removed messages   Posted: Fri Jan 16, 2009 1:26 pm   Subject: open your eyes
yeat
 
Replies: 3
Views: 4223




what have i done?
SeaMonkey <= 1.1.14 (marquee) Denial of Service Exploit
PostForum: All other security holes   Posted: Thu Jan 15, 2009 10:53 pm   Subject: SeaMonkey <= 1.1.14 (marquee) Denial of Service Exploit
yeat
 
Replies: 0
Views: 3007




Original link -> #!/usr/bin/perl
# SeaMonkey <= 1.1.14 (marquee) Denial of Service Exploit
# by athos - staker[at]hotmail[dot]it
# tested on ubuntu 8.10 / slackware 12 ...
Konqueror 4.1 XSS / Remote Crash Vulnerabilities
PostForum: All other security holes   Posted: Thu Jan 15, 2009 10:52 pm   Subject: Konqueror 4.1 XSS / Remote Crash Vulnerabilities
yeat
 
Replies: 0
Views: 2855




Original link -> +-----------------------------------------------------+
| Konqueror 4.1 XSS / Remote Crash Vulnerabilities |
+-----------------------------------------------------+
| by atho ...
CuteNews <= 1.4.6 (ip ban) XSS / RCE Exploit (adm req.)
PostForum: Shell commands injection   Posted: Thu Jan 15, 2009 10:51 pm   Subject: CuteNews <= 1.4.6 (ip ban) XSS / RCE Exploit (adm req.)
yeat
 
Replies: 0
Views: 8894




this is not a critical vuln because you need of a super account.

Original link -> #!/usr/bin/php -q
<?php

/*********************************************************************
* CuteNe ...
DeluxeBB <= 1.2 Remote Blind SQL Injection Exploit
PostForum: Sql injection   Posted: Thu Jan 15, 2009 10:49 pm   Subject: DeluxeBB <= 1.2 Remote Blind SQL Injection Exploit
yeat
 
Replies: 0
Views: 2552




Original link ->
#!/usr/bin/perl
# --------------------------------------------------
# DeluxeBB <= 1.2 Remote Blind SQL Injection Exploit
# ----------------------------------------------- ...
PHP-Fusion <= 7.00.2 Remote Blind SQL Injection Exploit
PostForum: Sql injection   Posted: Thu Jan 15, 2009 10:47 pm   Subject: PHP-Fusion <= 7.00.2 Remote Blind SQL Injection Exploit
yeat
 
Replies: 0
Views: 2752




Original link ->
#!/usr/bin/perl -w
# -------------------------------------------------------
# PHP-Fusion <= 7.00.2 Remote Blind SQL Injection Exploit
# by athos - staker[at]hotmai ...
Talk bot
PostForum: Perl   Posted: Thu Jan 15, 2009 10:45 pm   Subject: Talk bot
yeat
 
Replies: 1
Views: 4341




change language...you must to study perl or PHP Smile autoit is an orrible language because it works just on windows.

regards
XOOPS 2.3.2 (mydirname) Remote PHP Code Execution Exploit
PostForum: XOOPS   Posted: Thu Jan 15, 2009 10:42 pm   Subject: XOOPS 2.3.2 (mydirname) Remote PHP Code Execution Exploit
yeat
 
Replies: 1
Views: 3898




(myself Razz)
hello i'm StAkeR also know as yeat or athos Razz (i love yeat) anyway..i'm here because i know that waraxe is a great bug hunter.

Original Link
#!/usr/bin/php -q
<?php

/******** ...
Page 1 of 1
All times are GMT
  




Powered by phpBB 2001-2008 phpBB Group






All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.098 Seconds