 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 359
Members: 0
Total: 359
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
Sorry, I looked. Thanks for the information, I really appreciate all the help. |
|
|
|
|
All right, thanks. I guess a little social engineering never hurt anyone . I also suppose opening one of the files in the docs directory and changing it isn't viable either. Theory says it is, exper ... |
|
|
|
|
No problem. I'll PM you my forum address and his. I only obfuscated the addresses for those with ill intent that may come across this thread. I don't want to be responsible for a friend losing their s ... |
|
|
|
|
This is the output I got from my own website's FTP server. No I don't generally connect I just store files there for my members to download.
220 Welcome to the New Chaos Programming FTP Server
Use ... |
|
|
|
|
I have Charter, so I have a cable modem. I was able to enter passive mode but not much of anything else. If you look at my previous post you'll see the available commands for anonymous users. I may ha ... |
|
|
|
|
Oh, thank you very much. I told you I'd never done FTP before and I suppose that proved it . I'm only 19 so I deserve a break (not really but it's fun to say). Here's the output I got.
220------- ... |
|
|
|
|
I'm using the built in (sucky,yes I know) windows ftp client, the one from cmd so I guess I can't use passive mode. I'll try allowing it in my firewall. Also thanks for the info about "ls -la" |
|
|
|
|
Well honestly I'm new to this. I'm a white-hat script kiddie (at best) so right now I need as much help as I can get. I know the sql (more or less) to fetch the password of a specified user, which is ... |
|
|
|
|
Like I said these are just theories...ideas. I THINKI can upload. I don't know for sure. You also have to remember I don't know a lot of php. I don't know the lines. The best I could do would be
$pas ... |
|
|
|
|
Thanks for the reply, and as far as I know he doesn't have any MODs installed, and most of the non-standard features he made himself. He's a game programmer and a wiz at C++ and I'm guessing he knows ... |
|
|
|
|
I can do the rest myself easily enough. The site has html disabled, only standard bbcode, and (for now) the docs directory is still there, unprotected. Here is a full path disclosure of the site.
/ ... |
|
|
|
|
not sure if anyone's already tried this one or if this is even still alive but if someone could get the plaintext for 5fa1945440ea8b853cce2dcc59f567ea i'd be grateful |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|