 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 435
Members: 0
Total: 435
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
smf 1.1.8--how did he do it? |
 |
Posted: Thu Jun 25, 2009 8:38 pm |
|
|
IllIllIll |
Beginner |

 |
|
Joined: Jun 25, 2009 |
Posts: 1 |
|
|
|
 |
 |
 |
|
hi everyone, extremely new to this site and exploits, not new to IT.
however, i have always used IT for fun and work, never to mess with somebody.
well i am a member of a forum and one of the senior members on there has displayed a habit of 'outing' new users on there, as a way of hazing; posting their full name, pics of them gleaned from social networking sites or google caches. i started getting annoyed with it and spoke up. i thought they were exploiting the naive nature of the new users by using their publicly displayed email address to find the pics and info. but, my email address is hidden (supposedly). so when i spoke up about it, i did so rather aggressively. well...the guy decided to go after me. he didnt come up with a name or anything else that i know of, but he did come back with a picture of me. even though for the most part, its harmless, i feel like i have been raped lol. i mainly want to know how he did it. my username is generic, 6 characters. the forum is smf 1.1.8. the user that did it is not a moderator or admin. i didnt fill out any of the profile or any info whatsoever, and have been a member for almost two years. the only thing i can think of is somehow he got my ip, or hacked into admin rights and got my email address.
any ideas or help would be extremely appreciated. |
|
|
|
|
 |
 |
|
 |
Posted: Fri Jun 26, 2009 1:58 am |
|
|
gibbocool |
Advanced user |

 |
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
 |
 |
 |
|
Well unless he got your email address somehow, I guess he could have found your picture by searching your username and maybe you posted the picture at another website under that name? |
|
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|