 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 190
Members: 0
Total: 190
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
mmm try the backup system
/install/........... !  |
|
|
|
|
pm me with the site you need to hack only
i g0t one private .. can not share it sorry  |
|
|
|
|
so simple ..
just go to admincp or modcp:
http://www.site.com/forum/admincp
or
http://www.site.com/forum/modcp
and there it goes .. over the login window  |
|
|
|
|
you need configure phpshell, in default not work, you need make full path.
what kernel and year is you victim?
or send me pvt i redirect for one good irc channel
i need help as well ... |
|
|
|
|
LIUNX where are you
this shell is not bypassing the save - mode at all
more explanations needed perhaps  |
|
|
|
|
will have a look at it later .. thanX dude ..
by the way why is ur usertitle --> newbie and u are moderator
I fixed this finally
REMARKABLE change  |
|
|
|
|
will have a look at it later .. thanX dude ..
by the way why is ur usertitle --> newbie and u are moderator  |
|
|
|
|
http://geocities.yahoo.com.br/ssk_bk/tool25.txt
okay dude .. thanx for providing ..
but see the 3rr0r here:
This server is in safemode. Activate 'file listing' and try to own this ... |
|
|
|
|
this is anoying
where are YOU ?????? |
|
|
|
|
commands for this tool ??
posting them will be appricated ..
do not say same as DOS commands
i need more of them  |
|
|
|
|
will have a look at it l4t3r  |
|
|
|
|
hehehehe
no worrys man ..
it's to do with the site's server .. no thing related to ur PC  |
|
|
|
|
not allowed
pm me for any kind of help  |
|
|
|
|
try all the info u found in config.php files ..
may one of them is the same as ftp info ...
so many admin fools did have the save passwords ..
even their e-mail pass may be the same lol :twi ... |
|
|
|
|
google:
"Powered by phpBB" inurl:"index.php?s" OR inurl:"index.php?style"
it's mentioned in the exploit code  |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|