 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 115
Members: 0
Total: 115
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
kr0k0 |
|
Replies: 0 |
Views: 10968 |
|
|
 |
 |
 |
|
I think it's clear, I can't use quote ' .. any suggection to bypass ?
LOGIN: aaa'
PASS: bbb'
Couldn't access table (SELECT * FROM administrators WHERE username = 'aaa\'' AND password = ... |
|
|
|
kr0k0 |
|
Replies: 1 |
Views: 8615 |
|
|
 |
 |
 |
|
744286e61dcfd312
Is crackable ? |
|
|
|
kr0k0 |
|
Replies: 0 |
Views: 8108 |
|
|
 |
 |
 |
|
I made this page as it the same ...
<html>
<form name="AddNewdForm" id="AddNewdForm" action= "http://www.xxx.com/once.php" method="post" enctyp ... |
|
|
|
kr0k0 |
|
Replies: 0 |
Views: 6051 |
|
|
 |
 |
 |
|
If someone can help me, Can you help me identify this hash ?
AQBxF2ZGqEJk6XT_ |
|
|
|
kr0k0 |
|
Replies: 0 |
Views: 9124 |
|
|
 |
 |
 |
|
I just found that URL site in vain and I m wondering about,Take A look and you will understand...
/icon.aspx?m=profile
Normal page! ( It show a picture with icon type.)
/icon.aspx?m=bla ... |
|
|
|
kr0k0 |
|
Replies: 2 |
Views: 9351 |
|
|
 |
 |
 |
|
You can send me a pm with the site URL if you want?
Yea of course, PMed..
PS : Look here plz [ http://sla.ckers.org/forum/read.php?16,34992 ]  |
|
|
|
kr0k0 |
|
Replies: 2 |
Views: 9351 |
|
|
 |
 |
 |
|
Ummm, take a look and you will understand..
/?idwp=484d242e0cf899.31823007
Work!
/?idwp=484d242e0cf899.31823007/*
/?idwp=484d242e0cf899.31823007--
/?idwp=484d242e0cf899.31823007)--
/ ... |
|
|
|
kr0k0 |
|
Replies: 2 |
Views: 11178 |
|
|
 |
 |
 |
|
Hey i m wonderin' if the file is vulnerable or no, With RFI or lfi,remote execution..Look please and tell...
<?PHP
// Check to ensure this file is within the rest of the framework
defin ... |
|
|
|
kr0k0 |
|
Replies: 1 |
Views: 10879 |
|
|
 |
 |
 |
|
Hi..;I m not abel to do something here Cuz it give "No permission" Each time I inject sometime..Damn, Maybe you can help me..I will explain more.
Here is the vuln URL..
http://www.URL.com/ ... |
|
|
|
kr0k0 |
|
Replies: 0 |
Views: 7603 |
|
|
 |
 |
 |
|
Hi, I think that i've found a Bug and its little hard for me.., Probably one of you could do something'..Waraxe!
https://URL.com/../../Login.asp
Your number : 770003100
Your Password ... |
|
|
|
kr0k0 |
|
Replies: 0 |
Views: 5605 |
|
|
 |
 |
 |
|
Plz I really need to crack theses hash's..
user1:09b7eca553726676
user2:7ac505633e640ac5
user3:311113c017b0d5b7
user4:46479e146d72c174
user5:27e58c3a5dea14b6
user6: ... |
|
|
|
kr0k0 |
|
Replies: 3 |
Views: 11878 |
|
|
 |
 |
 |
|
Euh can you give me somes examples waraxe? with columns or load_file() function cuz I just have tried this and it doesnt workin'..Sorry and thank's for all things...
AND ascii(substring(& ... |
|
|
|
kr0k0 |
|
Replies: 3 |
Views: 11878 |
|
|
 |
 |
 |
|
Hey,
AND (substring((SELECT load_file('/etc/passwd') limit 0,1),1,1)='r')
I have a SQL blind ...and I wanna selecte a line into the file that I load'..When i try ... |
|
|
|
kr0k0 |
|
Replies: 0 |
Views: 5622 |
|
|
 |
 |
 |
|
Hey..PLZ i really need to crack these hashs...important.., thank's in advanced..
311113c017b0d5b7
46479e146d72c174
27e58c3a5dea14b6
19fabd6c61c3807d |
|
|
|
kr0k0 |
|
Replies: 2 |
Views: 8937 |
|
|
 |
 |
 |
|
I have a problem and i just need help plz, look..
I just tried to inject those injections & some requests dont works..need solution plz
When i try this injection..it work perfectly true an ... |
|
|
Page 1 of 9 |
Goto page 1, 2, 3, 4, 5, 6, 7, 8, 9Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|