Waraxe IT Security Portal
Login or Register
April 16, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 333
Members: 0
Total: 333
Full disclosure
CyberDanube Security Research 20260408-1 | Multiple Vulnerabilities in Siemens SICAM A8000
CyberDanube Security Research 20260408-0 | Remote Operation Denial of Service in Siemens SICAM A8000
SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS
SEC Consult SA-20260401-0 :: Broken Access Control in OpenWebUI
SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library
Apple OHTTP Relay: 14 Third-Party Endpoints, 6 Countries,Zero User Visibility
[KIS-2026-06] MetInfo CMS <= 8.1 (weixinreply.class.php) PHP Code Injection Vulnerability
[CVE-2026-33691] OWASP CRS whitespace padding bypassvulnerability
APPLE-SA-03-24-2026-10 Xcode 26.4
APPLE-SA-03-24-2026-9 Safari 26.4
APPLE-SA-03-24-2026-8 visionOS 26.4
APPLE-SA-03-24-2026-7 watchOS 26.4
APPLE-SA-03-24-2026-6 tvOS 26.4
APPLE-SA-03-24-2026-5 macOS Sonoma 14.8.5
APPLE-SA-03-24-2026-4 macOS Sequoia 15.7.5
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 6 matches
Question about fix to 008 hole
PostForum:How to fix Posted: Sat Jul 17, 2004 7:32 pm Subject: Re: hey
Jeruvy
Replies: 9
Views: 24307




dissable the
No, this is not option.

Why?


Same thing could appears in guestbook or somethine else.

Example?


And we have to leave ability to include

Then don't mess with it. I'm ...
new exploit: $content
PostForum:PhpNuke Posted: Wed Jul 14, 2004 4:05 pm Subject: new exploit: $content
Jeruvy
Replies: 7
Views: 14673




Even if it's a local variable, it still can be used for XSS

Call me skeptical but I'd like to see a PoC.

Thanks,
how to fix coppermine
PostForum:PhpNuke Posted: Tue Jul 06, 2004 6:29 pm Subject: how to fix coppermine
Jeruvy
Replies: 1
Views: 8879




Could you post this on the coppermine forum?

I don't know the url off hand, but you can also post any bugs here:

http://www.cpgnuke.com/Forums2/viewforum/f=4.html

AFAIK, most published holes ...
PhpNuke cookies manual crafting HowTo
PostForum:PhpNuke Posted: Tue Jun 29, 2004 5:35 pm Subject: PhpNuke cookies manual crafting HowTo
Jeruvy
Replies: 18
Views: 45736




I wonder if this may be the reason...

if (!defined('ADMIN_PAGES')) { header('Location: ../../'); exit; }

J.
to waraxe
PostForum:General discussion Posted: Tue Jun 29, 2004 5:22 pm Subject: to waraxe
Jeruvy
Replies: 31
Views: 45809




You need 6+ days to crack 8 character long password md5 hash.. Surprised Surprised

6 days!?!?!?? you need to read more.. Wink

With some real dictionary hashes, it should take an hour or so =)

l0phtcrack wil ...
[waraxe-2004-SA#029] - Remote File Inclusion in PhpNuke
PostForum:How to fix Posted: Thu Jun 17, 2004 11:46 am Subject: [waraxe-2004-SA#029] - Remote File Inclusion in PhpNuke
Jeruvy
Replies: 4
Views: 19243




Hi waraxe,

My first post on the board, but you've certainly seen my feedback on your disclosures.

This patch breaks several websites.

The problem is the setting of

$modpath = '';

If ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.044 Seconds