 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 298
Members: 0
Total: 298
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
| Harry |
|
| Replies: 1 |
| Views: 10862 |
|
|
 |
 |
 |
|
Lol....went back home after posting the previous msg from office & WOAH!!! RELEVANT ADS ON MY SITE ....some magic happening here...lol....Guess we need to wait for Google.
Maybe change the meta.p ... |
|
|
|
| Harry |
|
| Replies: 1 |
| Views: 10862 |
|
|
 |
 |
 |
|
Hello,
Does anyone in here has a PHPNuke website and gets content related Google ads? I get relevant ads on the inside pages but not on the homepage. I have changed the meta.php file als ... |
|
|
|
| Harry |
|
| Replies: 3 |
| Views: 12072 |
|
|
 |
 |
 |
|
| Deleting admin.php is fine...I would rather password protect my admin.php using a .htaccess.... you got a cool site.... theres one flaw on ur site tho..anyone can cheat by voting multiple times frm sa ... |
|
|
|
| Harry |
|
| Replies: 1 |
| Views: 9357 |
|
|
 |
 |
 |
|
Could you please tell us how did u get the admin pass  |
|
|
|
| Harry |
|
| Replies: 3 |
| Views: 12072 |
|
|
 |
 |
 |
|
| www.nuke100.com was exploited by someone yesterday, it wasnt any of the exploits listed here....anyone aware of the new exploit? |
|
|
|
| Harry |
|
| Replies: 1 |
| Views: 9014 |
|
|
 |
 |
 |
|
Just cos noone had to say anything abt phpnuke since long time we have the post above  |
|
|
|
| Harry |
|
| Replies: 1 |
| Views: 9782 |
|
|
 |
 |
 |
|
Many sites allow you to use html tags viz in Guestbooks, feedbacks, topsites etc. This can easily be exploited to redirect the entire webpage to whatever site/page you want.
Proof of concept:
Si ... |
|
|
|
| Harry |
|
| Replies: 6 |
| Views: 13564 |
|
|
 |
 |
 |
|
Would love to do that....you wont be bothered to read a book or info after working for 12-15 hrs a day I do try alot of things when I have my weekly off .....thanx for the info tho....keep up the ... |
|
|
|
| Harry |
|
| Replies: 6 |
| Views: 13564 |
|
|
 |
 |
 |
|
lol...I know its not a problem, all patched sites will ban ur ip or take u back to index.php... was wondering if I am lacking behind by not using some other sql query Thanx anyways. |
|
|
|
| Harry |
|
| Replies: 6 |
| Views: 13564 |
|
|
 |
 |
 |
|
We have alot of sql injection exploits courtesy "JANEK" but I have seen just 2 scripts till date, the problem with these scripts is :
**/UNION/**/SELECT/**/0,0,pwd,0,0,0,0,0,0/**/FROM/**/nuke_auth ... |
|
|
|
| Harry |
|
| Replies: 3 |
| Views: 9825 |
|
|
 |
 |
 |
|
| My friend has a phpnuke website which was exploited using the old admin exploit below "http://localhost/nuke71/admin.php?op=AddAuthor&add_aid=waraxe2&add_name=God&add_pwd=coolpass&add_ ... |
|
|
|
| Harry |
|
| Replies: 11 |
| Views: 25884 |
|
|
 |
 |
 |
|
It takes back to index.php when theres no journal by any of the admins....not sure....maybe waraxe can throw some light.....waiting for exploit part 2  |
|
|
|
| Harry |
|
| Replies: 11 |
| Views: 25884 |
|
|
 |
 |
 |
|
I think this works only if theres a journal posted by the admin - not sure though  |
|
|
|
| Harry |
|
| Replies: 2 |
| Views: 14830 |
|
|
 |
 |
 |
|
The original message was received at Thu, 20 May 2004 00:41:10 GMT
from web14803.mail.yahoo.com [216.136.224.219]
----- The following addresses had permanent fatal errors -----
<security-an ... |
|
|
| Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|