 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 215
Members: 0
Total: 215
|
|
|
|
|
 |
Full disclosure |
 |
Google Firebase hosting suspension / "malware distribution"bypass
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
Yanni |
|
Replies: 9 |
Views: 13733 |
|
|
 |
 |
 |
|
Hi, yes that would be excellent if anyone could help out - here below are some of the ones I am unable to crack. Waraxe, I will PM you the name of the site that they refer to...
USERNAME
Blackadde ... |
|
|
|
Yanni |
|
Replies: 9 |
Views: 13733 |
|
|
 |
 |
 |
|
OK thanks - yes that works for some of the passwords, I take it that where it doesnt work is when a user has used a more secure password string - i.e. not a standard word... am i correct?
Unfortuna ... |
|
|
|
Yanni |
|
Replies: 9 |
Views: 13733 |
|
|
 |
 |
 |
|
Is this what you need -
1 00601c543883cae9fc9505bdc5418f83
1 00b18fed45cb846b2727bd4c40cc403b
1 00bfc8c729f5d4d529a412b12c58ddd2
1 00eda5525b6289b0ded9eb0bf318efef
1 0115ce57cd52ca66533eed9 ... |
|
|
|
Yanni |
|
Replies: 9 |
Views: 13733 |
|
|
 |
 |
 |
|
Ok, so it would seem my initial question was one of those "stupid questions".... if anyone would pm me I could tell them about my site and the offending site - perhaps one of you guys would then do so ... |
|
|
|
Yanni |
|
Replies: 9 |
Views: 13733 |
|
|
 |
 |
 |
|
Hi everyone,
Absolutely new to this. Managed to get a copy of the database of a site which runs on phpBB 2.0.x
These guys were users on my forum and then started a new forum behind my back with ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|