 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 112
Members: 0
Total: 112
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
demon |
|
Replies: 1 |
Views: 8948 |
|
|
 |
 |
 |
|
<?php
function lisanskontrol2( $site_lisans )
{
if ( substr( getenv( "HTTP_HOST" ), 0, 4 ) == "www." )
{
$domain ... |
|
|
|
demon |
|
Replies: 1 |
Views: 9294 |
|
|
 |
 |
 |
|
You don't need to decode it it's C99 Web Shell  |
|
|
|
demon |
|
Replies: 1 |
Views: 9458 |
|
|
 |
 |
 |
|
It's a simple php web shell:
http://paste2.org/CKy9xFvH |
|
|
|
demon |
|
Replies: 1 |
Views: 11471 |
|
|
 |
 |
 |
|
see pm for more info about them  |
|
|
|
demon |
|
Replies: 6 |
Views: 16864 |
|
|
 |
 |
 |
|
http://pastebin.com/J6CDxcCQ |
|
|
|
demon |
|
Replies: 1 |
Views: 8391 |
|
|
 |
 |
 |
|
<?php
function paypalnofees_activate()
{
defineGatewayField("paypalnofees", "text", "comerciopaypal", "", "Merchant account ID ... |
|
|
|
demon |
|
Replies: 1 |
Views: 9323 |
|
|
 |
 |
 |
|
21232f297a57a5a743894a0e4a801fc3:admin |
|
|
|
demon |
|
Replies: 2 |
Views: 11992 |
|
|
 |
 |
 |
|
It's obfuscated by hex and octal  |
|
|
|
demon |
|
Replies: 3 |
Views: 10822 |
|
|
 |
 |
 |
|
ok, decoded to get it see pm  |
|
|
|
demon |
|
Replies: 3 |
Views: 10822 |
|
|
 |
 |
 |
|
What is in this file twilight_loader.php ? |
|
|
|
demon |
|
Replies: 3 |
Views: 10454 |
|
|
 |
 |
 |
|
aponte you haven''t decoded it
<?php
function check_footer()
{
$l = "<a href=\"http://www.sinevt.com\" title=\"Film İzle, <?php bloginf ... |
|
|
|
demon |
|
Replies: 3 |
Views: 9422 |
|
|
 |
 |
 |
|
jigs15784 advertise your website somewhere else, and cimix if you want your file just contact with pLaS71k  |
|
|
|
demon |
|
Replies: 4 |
Views: 6890 |
|
|
 |
 |
 |
|
What is the problem with the file ? |
|
|
|
demon |
|
Replies: 4 |
Views: 10068 |
|
|
 |
 |
 |
|
That's normal, decoding codelock is not easy job  |
|
|
|
demon |
|
Replies: 2 |
Views: 9177 |
|
|
 |
 |
 |
|
cracked...
049a323fa12c8274fde4dd767ffe2aba:lajèi13 |
|
|
Page 1 of 33 |
Goto page 1, 2, 3 ... 31, 32, 33Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|