 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 299
Members: 0
Total: 299
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
| qr4t |
|
| Replies: 3 |
| Views: 11863 |
|
|
 |
 |
 |
|
| what compiler are you using? |
|
|
|
| qr4t |
|
| Replies: 4 |
| Views: 31850 |
|
|
 |
 |
 |
|
| argentino you are a registered user of astalavista.net? |
|
|
|
| qr4t |
|
| Replies: 18 |
| Views: 48628 |
|
|
 |
 |
 |
|
I found 2 tools to automate the sql injection process. I tested them and got some users/passwds My tests also showed that it missed some sql injections
Here's how to use them:
First i searched ... |
|
|
|
| qr4t |
|
| Replies: 4 |
| Views: 13757 |
|
|
 |
 |
 |
|
| Well i have some experience with ARP poisoning also. I never thought it is so easy. I just installed Cain&Abel and started it and waited. After some minutes i started receiving passwords from my ... |
|
|
|
| qr4t |
|
| Replies: 7 |
| Views: 14845 |
|
|
 |
 |
 |
|
The best way to have access to the tables is to join the team and help make the tables.
well in this case is there any way i could join the team ? |
|
|
|
| qr4t |
|
| Replies: 58 |
| Views: 87967 |
|
|
 |
 |
 |
|
Now to open config.php is should be
&highlight=%2527.$poster=`cat%20config.php`.%2527
Well that gives me a blank.It should be writtem elseways?
after this you should see the page source, beca ... |
|
|
|
| qr4t |
|
| Replies: 5 |
| Views: 15296 |
|
|
 |
 |
 |
|
also similar:
www.k-otik.com/exploits
www.milw0rm.com |
|
|
|
| qr4t |
|
| Replies: 8 |
| Views: 14468 |
|
|
 |
 |
 |
|
Muahaha  |
|
|
|
| qr4t |
|
| Replies: 3 |
| Views: 12136 |
|
|
 |
 |
 |
|
Q2:
Now you should use programs similar to this (its not very good but the first i found) http://packetstorm.linuxsecurity.com/0102-exploits/SQLExec.zip, it connects to mssql port 1433 and if user/pa ... |
|
|
|
| qr4t |
|
| Replies: 7 |
| Views: 14845 |
|
|
 |
 |
 |
|
www.Plain-Text.org <- will there be a test user like at www.midga.org, cause i'd really need to get access to these great tables  |
|
|
|
| qr4t |
|
| Replies: 8 |
| Views: 14468 |
|
|
 |
 |
 |
|
yes, the hash is the code after de "sid="  |
|
|
| Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|