 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 128
Members: 0
Total: 128
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
That was quick.. Thank you  |
|
|
|
|
Hello guys,
Can I ask you for favor, I need to crack one password from .htpasswd file.
fogxFDgIY8ZMY
Thank you |
|
|
|
|
If someone can "crack" this hash, I would be very grateful,
MD5: 42d233e93e3957414ad7f29f89a1b6c0
Thanks |
|
|
|
|
Thank you Cyko for your reply. Its really useful.
Also can you tell me is there any way someone to bypass my initial code na upload shell to my website ?
Thanks |
|
|
|
|
Hello guys,
I need advice is there any chance someone to upload shell in my website. I use following code to prevent malicious uploads.
First:
function getFileExtension($str) {
... |
|
|
|
Frenkie |
|
Replies: 1128 |
Views: 1341511 |
|
|
 |
 |
 |
|
This one if possible. Thanks
21ce6038c88d54ecf9ee70a8cfb7a4e8
c5fa70ee74b783fb3c629917ef353b22 |
|
|
|
|
I'm sure that mysql version is 5.x .. Main problem is WAF that I cant bypass |
|
|
|
|
I already tried that in sqlmap but with no success  |
|
|
|
|
Havij cant find column count  |
|
|
|
|
Hello everybody,
I need help with selecting union for sql injection. Here is results:
http://www.something.com/cat.php?id=1 order by 17 OK
http://www.something.com/cat.php?id=1 order b ... |
|
|
|
|
Paying thru PayPal $ $ |
|
|
|
|
Anyone know remote exploit for phpBB <=2.0.16
Thanks in advance  |
|
|
|
|
Anyone have modified mysql client to connect for testing this security flaw. ?? |
|
|
|
|
All in title.. Here is config from router, please help me find password.
ip ssh source-interface FastEthernet0/1
!
password encryption aes
!
!
username tus privilege 15 secret 5 $1$i36F$DR7ksC ... |
|
|
Page 1 of 4 |
Goto page 1, 2, 3, 4Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|