Waraxe IT Security Portal
Login or Register
January 28, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 80
Members: 0
Total: 80
Full disclosure
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
SEC Consult SA-20260126-2 :: UART Leaking Sensitive Data in dormakaba registration unit 9002 (PIN pad)
SEC Consult SA-20260126-1 :: Multiple Critical Vulnerabilities in dormakaba Access Manager
SEC Consult SA-20260126-0 :: Multiple Critical Vulnerabilities in dormakaba Kaba exos 9300
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
OpenMetadata <= 1.11.3 Authenticated SQL Injection
[REVIVE-SA-2026-001] Revive Adserver Vulnerabilities
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction
TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
TinyOS 2.1.2 printfUART Global Buffer Overflow via UnboundedFormat Expansion
KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 10 matches
[TUTO] Upload Shell AdminCp [ Vbulletin All Version ]
PostForum:vBulletin Board Posted: Sun Aug 17, 2008 9:02 pm Subject: [TUTO] Upload Shell AdminCp [ Vbulletin All Version ]
cO2_dz
Replies: 21
Views: 65223




Hi, Razz
Link:
http://www.dz-secure.com/tools/waraxe-shell.xml.txt
All my respect.
/cO2
[HELP] - Vbuletin admincp
PostForum:vBulletin Board Posted: Sun Aug 17, 2008 9:01 pm Subject: [HELP] - Vbuletin admincp
cO2_dz
Replies: 2
Views: 9082




Hi, Razz
Link : http://www.dz-secure.com/tools/waraxe-shell.xml.txt
All my respect
/cO2
help in sql injection (mssql )
PostForum:Sql injection Posted: Sun Aug 17, 2008 7:42 pm Subject: Re: help in sql injection (mssql )
cO2_dz
Replies: 2
Views: 7875




Microsoft JET Database Engine error '80040e14'
Syntax error in string in query expression 'article_id=10

articles/artivle_details.asp, line 14

Hi, Razz

Try:
/artivle_details.asp?article_id=1 ...
sql injection problem [please help]
PostForum:Sql injection Posted: Sun Aug 17, 2008 7:32 pm Subject: sql injection problem [please help]
cO2_dz
Replies: 2
Views: 7621




Hi, Razz

Maybe, can you see like this one \"users2\"/* in your error SQL ?
It's magic quotes problem, For bypass it , You must encoding ur 'USER' to hex() or char() ,



id=1+AND+1=0+union+all+s ...
The King of PHP-Injection?
PostForum:Full path disclosure Posted: Sat Aug 16, 2008 10:38 pm Subject: The King of PHP-Injection?
cO2_dz
Replies: 3
Views: 13737




Sorry, but i fail to see any RFI/LFI of file disclosure here. It may be XSS at best ...




It is XD Laughing , it's a Remote File Disclosure Vulnerability, not a Local file inclusionhttp://www. ...
The King of PHP-Injection?
PostForum:Full path disclosure Posted: Sat Aug 16, 2008 5:21 pm Subject: The King of PHP-Injection?
cO2_dz
Replies: 3
Views: 13737




Hey all XD, need to know a solution for this fucking BUG, Laughing

it's not a LFI bug,It's just a RFD remote file disclosure vulnerability for some uploaded pics ,
Hep brothers if anyone can to do ...
locale root exploit
PostForum:Newbies corner Posted: Wed Aug 13, 2008 6:13 pm Subject: locale root exploit
cO2_dz
Replies: 3
Views: 11007




Video-I:
1- To connecting through NCLink : http://www.mlfnt.net/323257


Video-II:
1- To root server with a local exploit
2- Add a user with a permission "ROOT" XD
3- Creat a R ...
locale root exploit
PostForum:Newbies corner Posted: Wed Aug 13, 2008 5:50 pm Subject: locale root exploit
cO2_dz
Replies: 3
Views: 11007




Hi, Laughing

You must first of all connect with backconnection to the box. this can done with
two ways if we have the suitable shell.u can use the Back-Connect module of r57/c99 shell
or to upload ...
#Phreaking XD
PostForum:All other security holes Posted: Tue Aug 12, 2008 11:39 pm Subject: #Phreaking XD
cO2_dz
Replies: 4
Views: 12093




I'm not looking to those thing Razz , but in any case Thank you very much for ur answer.

Well its not really phreaking, that would involve tampering with tones down an analogue phone line Smile

And a ...
#Phreaking XD
PostForum:All other security holes Posted: Tue Aug 12, 2008 10:51 am Subject: #Phreaking XD
cO2_dz
Replies: 4
Views: 12093




Hi, Laughing

Im wondering how to use SMS Injections Cool , and how SMS centers works (Im really waiting for the answer) , anyway I m wondering if any person are concerned about Phreaking world coz I loo ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.047 Seconds