Waraxe IT Security Portal
Login or Register
November 3, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 142
Members: 0
Total: 142
Full disclosure
SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructure)
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: : "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Dovecot CVE-2025-30189: Auth cache causes access to wrongaccount
SEC Consult SA-20251027-0 :: Unauthenticated Local File Disclosure in MPDV Mikrolab MIP 2 / FEDRA 2 / HYDRA X Manufacturing Execution System #CVE-2025-12055
Stored Cross-Site Scripting (XSS) via SVG File Upload -totaljsv5013
Stored HTML Injection - Layout Functionality - totaljsv5013
Stored Cross-Site Scripting (XSS) - Layout Functionality -totaljsv5013
Current Password not Required When Changing Password -totaljsv5013
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Struts2 and Related Framework Array/Collection DoS
[REVIVE-SA-2025-002] Revive Adserver Vulnerability
[REVIVE-SA-2025-001] Revive Adserver Vulnerability
SEC Consult SA-20251021-0 :: Multiple Vulnerabilities in EfficientLab WorkExaminer Professional (CVE-2025-10639, CVE-2025-10640, CVE-2025-10641)
[SYSS-2025-017]: Verbatim Store 'n' Go Secure Portable HDD (security update v1.0.0.6) - Offline brute-force attack
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 180 matches
www.hackr.org
PostForum:Try2hack sites Posted: Tue Aug 16, 2005 10:22 am Subject: www.hackr.org
SteX
Replies: 0
Views: 12403




http://www.hackr.org
Best hacking challenge i have ever seen..
SA#41 - Critical Sql Injection in PhpNuke 6.x-7.6 Top module
PostForum:General discussion Posted: Fri Apr 08, 2005 9:43 am Subject: SA#41 - Critical Sql Injection in PhpNuke 6.x-7.6 Top module
SteX
Replies: 16
Views: 33955




keep working..
Phpbb 2.0.13
PostForum:PhpBB Posted: Thu Mar 17, 2005 9:45 pm Subject: Re: Phpbb 2.0.13
SteX
Replies: 11
Views: 19214




First of all, thank for your good site
Sorry my english is bad , im french Wink


Is there already any exploit for 2.0.13 ?

No...for now Smile
vBulletin 3.0.6 and prior versions Exec commands in server
PostForum:Shell commands injection Posted: Wed Feb 23, 2005 9:47 pm Subject: vBulletin 3.0.6 and prior versions Exec commands in server
SteX
Replies: 12
Views: 28912




Original Link: http://www.milw0rm.com/id.php?id=832
Invision Board Account Access
PostForum:Newbies corner Posted: Sun Feb 20, 2005 11:13 pm Subject: Invision Board Account Access
SteX
Replies: 2
Views: 10864




version ???
nuke and sql injection questions
PostForum:PhpNuke Posted: Sat Feb 19, 2005 11:12 pm Subject: nuke and sql injection questions
SteX
Replies: 1
Views: 9851




nope Smile
search the forum,there are posted XSS examples already..
Vbullettin 3.0.x forumdisplay.php PHP command Execution
PostForum:All other software Posted: Wed Feb 16, 2005 10:38 pm Subject: j
SteX
Replies: 7
Views: 19590




http://www.milw0rm.com/id.php?id=820
MsN Messenger 6.2 Remot exec exploit fixed
PostForum:All other security holes Posted: Thu Feb 10, 2005 10:47 pm Subject: MsN Messenger 6.2 Remot exec exploit fixed
SteX
Replies: 1
Views: 10200




micro$oft lol..
buffer overflow again Smile
ps: working sploit :
http://zimnako.lucidpc.net/sploit.exe
i deleted godadmin :(
PostForum:Newbies corner Posted: Tue Jan 25, 2005 12:08 pm Subject: i deleted godadmin :(
SteX
Replies: 6
Views: 17449




How could you install phpnuke without knowing this?

I did't install phpnuke,he overtaked the site..
i deleted godadmin :(
PostForum:Newbies corner Posted: Sun Jan 23, 2005 10:23 pm Subject: i deleted godadmin :(
SteX
Replies: 6
Views: 17449




Create a SuperAdmin account via phpMyAdmin and in the pass field type

dc647eb65e6711e155375218212b3964

This wiil make it 'Password'. Then login and change it from the Nuke Admin panel.

Hope ...
i deleted godadmin :(
PostForum:Newbies corner Posted: Thu Jan 20, 2005 9:39 pm Subject: a
SteX
Replies: 6
Views: 17449




If there is not any admin account,when you go to admin manu you should see create GOD account page..
remote file inclusion in Zeroboard
PostForum:Remote file inclusion Posted: Wed Jan 19, 2005 2:37 pm Subject: remote file inclusion in Zeroboard
SteX
Replies: 8
Views: 33151




Google is blocking allinurl: /zboard/zboard.php
Google
Error
We're sorry...

... but we can't process your request right now. A computer virus or spyware application is sending us automated ...
Shell in PHP >Deface toolkit pro 1.6
PostForum:Tools Posted: Wed Jan 19, 2005 2:29 pm Subject: a
SteX
Replies: 8
Views: 48684




It is Infektion Group - Executor de Comandos v4.3
ATK - Attack Tool Kit (i test ATK, i recommend)
PostForum:Tools Posted: Tue Jan 18, 2005 10:06 pm Subject: ATK - Attack Tool Kit (i test ATK, i recommend)
SteX
Replies: 6
Views: 19151




I used older versions,and ATK is one of the best open-source scaners..
Shell in PHP >Deface toolkit pro 1.6
PostForum:Tools Posted: Tue Jan 18, 2005 9:46 pm Subject: Shell in PHP >Deface toolkit pro 1.6
SteX
Replies: 8
Views: 48684




is there any english version of this file ?
ps: http://tbc-labz.org/index.php?hacking=Toolz FULL LIST
Page 1 of 12 Goto page 1, 2, 3 ... 10, 11, 12Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.034 Seconds