Results 1 to 5 of 5
-
16th Feb 2012, 09:35 AM #1OPMemberWebsite's:
mafiaWarez.com phaze.co katzbb.com massddl.com buspic.comReview: PirateBB.Net
Need Review for my site http://piratebb.net (DLE type)
-sky- Reviewed by -sky- on . Review: PirateBB.Net Need Review for my site http://piratebb.net (DLE type) Rating: 5
-
16th Feb 2012, 01:14 PM #2Member
Looks good but room for improvement
The site looks good and clean but there's room for improvement.
First of all the logo, I like it but the big faded letters that says PIRATE was unnecessary in my opinion. Also the glow isn't vital and it isn't aligned with the rest of the containers.
Second is the navigation menu, I like the effects but on the section 'Category Menu' the list pops up above the actual icon so it becomes a bit annoying. It could just be because of my small screen.
Apart from that it looks good
-
17th Feb 2012, 03:14 AM #3OPMemberWebsite's:
mafiaWarez.com phaze.co katzbb.com massddl.com buspic.com
-
21st Feb 2012, 05:49 PM #4Probation
I like the layout. Seems quick and the content looks great! Good luck with it!
dpain1
-
21st Feb 2012, 10:28 PM #5MemberCode:
The web application sent a persistent cookie. The following scripts are vulnerable to a trivial form of XSRF: - http://piratebb.net/ The following scripts allow an attacker to send POST data as query string data (this makes XSRF easier to exploit): - The URL: http://piratebb.net/ is vulnerable to cross site request forgery. It allows the attacker to exchange the method from POST to GET when sending data to the server. An unidentified vulnerability was found at: "http://piratebb.net/", using HTTP method GET. The sent data was: "do=d'kc"z'gj'"%2A%2A5%2A(((%3B-%2A%60)&story=8710&subaction=3015". The modified parameter was "do". An unidentified vulnerability was found at: "http://piratebb.net/", using HTTP method GET. The sent data was: "do=ZcqDelm&story=d'kc"z'gj'"%2A%2A5%2A(((%3B-%2A%60)&subaction=8182". The modified parameter was "story". An unidentified vulnerability was found at: "http://piratebb.net/", using HTTP method GET. The sent data was: "do=kYvtSME&story=3125&subaction=d'kc"z'gj'"%2A%2A5%2A(((%3B-%2A%60)". The modified parameter was "subaction". The URL: http://piratebb.net/ is vulnerable to cross site request forgery. The URL "http://piratebb.net/" has the following allowed methods, which include DAV methods: *, ACL, BASELINE_CONTROL, CHECKIN, CHECKOUT, CONNECT, COPY, DEBUG, GET, HEAD, INDEX, INVALID, INVOKE, LABEL, LINK, LOCK, MERGE, MKACTIVITY, MKCOL, MKDIR, MKWORKSPACE, MOVE, NOTIFY, OPTIONS, PATCH, PIN, POLL, POST, PROPFIND, PROPPATCH, REPLY, REPORT, RMDIR, SEARCH, SHOWMETHOD, SPACEJUMP, SUBSCRIBE, SUBSCRIPTIONS, TEXTSEARCH, TRACE, TRACK, UNCHECKOUT, UNLINK, UNLOCK, UNSUBSCRIBE, VERSION_CONTROL.
Sponsored Links
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Similar Threads
-
LE With PirateBB.net
By -sky- in forum Link ExchangeReplies: 12Last Post: 19th Apr 2012, 12:48 PM -
Review: PirateBB.net
By -sky- in forum Site ReviewsReplies: 16Last Post: 11th Jan 2012, 04:29 PM -
Review: PirateBB.org
By torrfriend in forum Site ReviewsReplies: 20Last Post: 30th Dec 2011, 05:25 PM -
[Selling] Piratebb.org
By 2Sky in forum Completed TransactionsReplies: 10Last Post: 6th Aug 2011, 06:20 PM -
{Domain} PirateBB.net
By GeeZus in forum Completed TransactionsReplies: 4Last Post: 11th Jun 2009, 01:56 PM
themaRegister - register to forums...
Version 3.54 released. Open older version (or...