 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 110
Members: 0
Total: 110
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
Can someone crack this hash please ?
b45fb9feb7bfa79460e0a656554ca4ea |
|
|
|
Xelion |
|
Replies: 8 |
Views: 22351 |
|
|
 |
 |
 |
|
f.aspx?style=lol"><body onload="alert(123);"><lol lol= >> I have the alert "123"
f.aspx?style=lol"><body onload="document.location='http://www.yahoo.com'"><lol lol= & ... |
|
|
|
Xelion |
|
Replies: 8 |
Views: 22351 |
|
|
 |
 |
 |
|
http://www.startimes2.com/f.aspx?style=blue%22;t=document;alert(t.cookie);%22
I have the cookie, how to use it ? |
|
|
|
Xelion |
|
Replies: 8 |
Views: 22351 |
|
|
 |
 |
 |
|
|
|
|
Xelion |
|
Replies: 8 |
Views: 22351 |
|
|
 |
 |
 |
|
http://www.startimes2.com/f.aspx?style=lol%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E%3Clol%20lol=%22
Is blank too :s[/code] |
|
|
|
Xelion |
|
Replies: 8 |
Views: 22351 |
|
|
 |
 |
 |
|
Hi,
At this website : http://www.startimes2.com
I found this loophole :
http://www.startimes2.com/f.aspx?style=lol">lol<lol lol="
But if I do :
http://www.startimes2.com/f.aspx?style=lo ... |
|
|
|
Xelion |
|
Replies: 2 |
Views: 11096 |
|
|
 |
 |
 |
|
This is the http://md5.xelionblog.com cracked passwords ( 318 333 passwords )
Download :
MegaUpload : http://www.megaupload.com/fr/?d=V0X4Y9NE
FileSend : http://www.filesend.net/download.php?f ... |
|
|
|
Xelion |
|
Replies: 4 |
Views: 13039 |
|
|
 |
 |
 |
|
Yes I'm sure
Otherwise I try to trust someone who send a PHP script to find a loophole =) |
|
|
|
Xelion |
|
Replies: 4 |
Views: 13039 |
|
|
 |
 |
 |
|
Thank's
The code is :
<? if (isset($_GET['trick']))
echo '<span class="trick">'.$_GET['trick'].'</span><br/>';
?>
But if I do : ... |
|
|
|
Xelion |
|
Replies: 4 |
Views: 13039 |
|
|
 |
 |
 |
|
Hi,
I would like to know if there is a possibility to hack from displaying a $_GET:
<? PHP
echo $ _GET [ 'trick'];
?> |
|
|
|
|
Someone can decrypt this hashes plz :
e114aeb0395f87411979d038a956edcc
c02h7a631n54g12et709h1e4w2o45r78
7a631n54g12et709h1e4w2o45r78l77d
d2d57bb5e817f178da591c5330cb8f3e
44c06fa41f1218050264439 ... |
|
|
|
|
Hi,
I have this sql query :
$query = mysql_query("SELECT * FROM `table` WHERE `field`=".$_GET['field']);
$field = mysql_fetch_array($query);
echo $field['ps ... |
|
|
|
Xelion |
|
Replies: 0 |
Views: 11273 |
|
|
 |
 |
 |
|
Hi,
I just launch an md5 encryption / decryption website.
The decrypted word listal ready 280 000 words.
http://md5.xelionblog.com
The form allows you to encrypt words is in left and the form ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|