 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 297
Members: 0
Total: 297
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
w00 |
|
Replies: 0 |
Views: 7325 |
|
|
 |
 |
 |
|
Hello, i've been reading here about the phpnuke 7.6 exploit, that you can view the admin password hashes if you insert the sql injection.
But all i get is a white page and i had one site that gave a ... |
|
|
|
w00 |
|
Replies: 165 |
Views: 290649 |
|
|
 |
 |
 |
|
What are you asking of us then? I cant help you guys with the tables, but i can setup a forum. This is easy to backup and restore. I format my comp alot so its useless to place 1gb or more tables on i ... |
|
|
|
w00 |
|
Replies: 165 |
Views: 290649 |
|
|
 |
 |
 |
|
Heintz, im using the public one for now, cause i just wanted this 1 hash cracked. But it looks like the md5 cracker isnt running anymore... Cause it says "00 h 00 min. 01 sec." in the cracking time ar ... |
|
|
|
w00 |
|
Replies: 3 |
Views: 10618 |
|
|
 |
 |
 |
|
Nice  |
|
|
|
w00 |
|
Replies: 165 |
Views: 290649 |
|
|
 |
 |
 |
|
[edit]
nvm  |
|
|
|
w00 |
|
Replies: 8 |
Views: 16512 |
|
|
 |
 |
 |
|
Thanks waraxe, i cant thank you enough. Thanks to you i got it to work. |
|
|
|
w00 |
|
Replies: 8 |
Views: 16512 |
|
|
 |
 |
 |
|
Well, sql error message is clear:
"SQL Error : 1222 The used SELECT statements have a different number of columns"
So you have to
1. count, how many columns original query contains
2. modify ... |
|
|
|
w00 |
|
Replies: 8 |
Views: 16512 |
|
|
 |
 |
 |
|
Hello, i tried the phpBB 208 sqlinjeciotn exploit, wich expose the admin or any other users MD5 hash. But the thing is i cant get it to work on some phpBB forums. I come in debug mode. This is the deb ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|