 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 552
Members: 0
Total: 552
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
sp3x |
|
Replies: 5 |
Views: 20487 |
|
|
 |
 |
 |
|
"So it is very fu**ing confusing to do some sec audit Rolling Eyes"
Yes i know... the is phpnuke
Do you used phpnuke from nukefixes.com ??
They use recent phpnuke with all patches.
Here : ... |
|
|
|
sp3x |
|
Replies: 5 |
Views: 20487 |
|
|
 |
 |
 |
|
waraxe look : http://securityreason.com/achievement_securityalert/27
The adv was posted on : 15.11.2005
Exploit for this issue also was realised : http://securityreason.com/achievement_exploitaler ... |
|
|
|
sp3x |
|
Replies: 6 |
Views: 13995 |
|
|
 |
 |
 |
|
the code is open so there will be always some bugs.....
There is no public script that is 100% safe
PHPNuke is not secure.... why ? because a lot of code in some places are weak.... and i think th ... |
|
|
|
sp3x |
|
Replies: 42 |
Views: 52151 |
|
|
 |
 |
 |
|
Yeah some admins are good some bad
Some admins thanks to you and give you avaibility to test host and help him patch and give toy account for free who cost many dollars....
Some admins just call ... |
|
|
|
sp3x |
|
Replies: 42 |
Views: 52151 |
|
|
 |
 |
 |
|
There is one thing, i wanted to say out: phpnuke developers and/or nuke fix developers are not very ethical people
Let' see - base64 coding/decoding has been always big security hole to all th ... |
|
|
|
sp3x |
|
Replies: 19 |
Views: 45117 |
|
|
 |
 |
 |
|
i think this script that you gave LINUX and the link now
http://qwqw.altervista.org/tool25.dat?cmd=
dont bypass safemode because is missing the file safe25.dat
this file is needed to bypass safem ... |
|
|
|
sp3x |
|
Replies: 5 |
Views: 17692 |
|
|
 |
 |
 |
|
old bug....
this adv is false....
New bugs about postnuke .... critical bugs with full disclose where realised... and described on www.securityreason.com |
|
|
|
sp3x |
|
Replies: 9 |
Views: 16299 |
|
|
 |
 |
 |
|
thanks
but how ??
is there any mail to them.... on their site i dont see any contact to report the bugs... |
|
|
|
sp3x |
|
Replies: 9 |
Views: 16299 |
|
|
 |
 |
 |
|
hmmm this is very bad...
soooo you suggest to post the bugs to bugtraq ??
with no contact phpnuke team...
i have some bugs and there are critical also
What do you suggest ??
thanks fo ... |
|
|
|
sp3x |
|
Replies: 9 |
Views: 16299 |
|
|
 |
 |
 |
|
i have question to waraxe....
Where can i report bugs in phpnuke.... is there any mail to them ??
and also the same question but in postnuke ...
thanks for info... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|