 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 61
Members: 0
Total: 61
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
Need some advise so I am going straight to the problem.
I did one security hardening of PHP/MySQL site, after it was attacked. There were some obvious vulnerabilities as 'globals on' and unencrypt ... |
|
|
|
|
Link:
http://phpsec.org/
PHP Security Consortium (PHPSC) is an international group of PHP experts dedicated to promoting secure programming practices within the PHP community.
Also has a ... |
|
|
|
|
no use from that zilly... thats just bruteforce
btw. i found that 240MB (!) wordlist...
ziped its 23MB
rared its 30MB
here is the link:
http://packetstorm.securify.com/Crackers/wordlists/the ... |
|
|
|
|
What XSS can give you usually is cookie data for cookie insertion (posioning). With that you can simulate other person, which could have some kind of admin rights. With admin rights (on forum, cms, o ... |
|
|
|
|
I see only 1Gb. And POP3 for 15 Mb only, but thats great also!
Thanks! |
|
|
|
|
---------------------------------------------------------------------
---
how does it works and what it does?
im a bit confused  |
|
|
|
|
i didnt succed in doing that...
but i did upload avatar, that was acctualy php but with .jpeg exstension, and then rename it with other exploit...
dont know if it helps! |
|
|
|
|
lol for "cool bananas"
yeah im from govsec, i gave you that tip for WebProxy i think...
cheers |
|
|
|
|
A little contribution. Did this before waraxe did his tutorial. With little modification could be much more user friendly.
You just need to change $cookiename (although most have this value) and $pas ... |
|
|
|
|
not working  |
|
|
|
|
i downloaded from somewhere 120Mb wordlist, and would like to share it, but im on 56k and cant remember where i dl-ed it from...
well, no use of me  |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|