Waraxe IT Security Portal
Login or Register
January 14, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 50
Members: 0
Total: 50
Full disclosure
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction
TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
TinyOS 2.1.2 printfUART Global Buffer Overflow via UnboundedFormat Expansion
KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Bioformats v8.3.0 Untrusted Deserialization of Bio-Formats Memoizer Cache Files
Bioformats v8.3.0 Improper Restriction of XML External Entity Reference in Bio-Formats Leica Microsystems XML Parser
MongoDB v8.3.0 Heap Buffer Underflow in OpenLDAP LMDB mdb_load
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Newbies corner -> Can this be used for an hack. Url Change prints on the same
Post new topicReply to topic View previous topic :: View next topic
Can this be used for an hack. Url Change prints on the same
PostPosted: Wed Jun 10, 2009 2:01 pm Reply with quote
shyspy
Advanced user
Advanced user
Joined: Jun 08, 2009
Posts: 60




hi,

If something like this would work on an social networking sites phishing would been at its peak.
Anyways i really couldn't make out what exactly can i do as with concerns to exploits Or hackz.

This is an university website that displays results.

The only thing from a students point of view would be to show your parents that you passed even if you did nt.

Can anyone share some more info as can this lead to a major problem Or site defacment Or server hack Or something.

Or can this be done to any website Or wht?

please share more info as what is this find of stuff know and what can it do as with readgs to hackz.





Last edited by shyspy on Wed Jun 10, 2009 8:00 pm; edited 1 time in total
View user's profile Send private message
PostPosted: Wed Jun 10, 2009 6:29 pm Reply with quote
slsl
Advanced user
Advanced user
Joined: Oct 14, 2008
Posts: 66




i suggest you take down all the sensitive info here but bassicly all that is is a xss vulnerability
View user's profile Send private message
PostPosted: Wed Jun 10, 2009 8:05 pm Reply with quote
shyspy
Advanced user
Advanced user
Joined: Jun 08, 2009
Posts: 60




slsl wrote:
i suggest you take down all the sensitive info here but bassicly all that is is a xss vulnerability


Can you share some more informationn on what can it lead to ..
Is it an major security hole. And how to overcome.

And yes what exactly is an xss vulnerability -- > If any1 know some basic tuts and tools for this please point me to that direction.
View user's profile Send private message
PostPosted: Thu Jun 11, 2009 12:18 am Reply with quote
slsl
Advanced user
Advanced user
Joined: Oct 14, 2008
Posts: 66




Xss is extremely common and bassicly what it does is that it allows a person to inject client side code into the webpage and there are two types of XSS permanant which stays on the page a temporary which is not stored what that was was not stored. What its most commonly used in is phishing and with temporary xss it usually requires someone to click on a link that leads to that url.
View user's profile Send private message
Thankyou for information
PostPosted: Thu Jun 11, 2009 7:34 am Reply with quote
shyspy
Advanced user
Advanced user
Joined: Jun 08, 2009
Posts: 60




Thanku slsl ....
View user's profile Send private message
Can this be used for an hack. Url Change prints on the same
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.046 Seconds