Welcome!

Join our community of MMO enthusiasts and game developers! By registering, you'll gain access to discussions on the latest developments in MMO server files and collaborate with like-minded individuals. Join us today and unlock the potential of MMO server development!

Join Today!

Security Researcher (Ragezone vulnerability)

Status
Not open for further replies.
Initiate Mage
Joined
Dec 26, 2015
Messages
2
Reaction score
3
1: SQL connection limit has been reached, not a vulnerability just my.cnf limit rearched.
2: Redirect is open and always has been, its a part of our link logging system with vbulletin.


XSS > Also part of your system? :closedeyes:
 
Joined
Nov 14, 2001
Messages
29,406
Reaction score
21,609
189.110.84.173 - - [10/Nov/2016:01:38:23 +0000] "GET /redirect-to/?redirect=https://www.xssposed.org HTTP/1.1" 301 617 "https://www.openbugbounty.org/incidents/110930/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0"
189.110.84.173 - - [10/Nov/2016:01:38:58 +0000] "GET /redirect-to/?redirect=https://twitter.com/Eletroplus HTTP/1.1" 301 617 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0"
189.110.84.173 - - [11/Nov/2016:18:59:09 +0000] "GET /cache.php?img=i.imgur.com/DAG6Ttb.png HTTP/1.1" 301 617 "http://forum.ragezone.com/members/176864.html" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0"


Ugh....

deception ... not good!
 
Status
Not open for further replies.
Back
Top