 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 472
Members: 0
Total: 472
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
y3dips |
|
Replies: 8 |
Views: 67524 |
|
|
 |
 |
 |
|
why dont just update by yourself, it could be a framework )
for the light program, separate the pattern/vul path into another files, there you go... |
|
|
|
y3dips |
|
Replies: 8 |
Views: 22741 |
|
|
 |
 |
 |
|
knock..knock,
is just because its already patched ?  |
|
|
|
y3dips |
|
Replies: 2 |
Views: 11507 |
|
|
 |
 |
 |
|
Try this,
http://milw0rm.com//related.php?program=phpBB
sorry, not a kind of tutor, but let see if it help
practice work better then theory .. at least for me
--- |
|
|
|
y3dips |
|
Replies: 13 |
Views: 27805 |
|
|
 |
 |
 |
|
sorry to update, this problem are solve for alog long time ago, never had it again,
ive already switch to gentoo as my regular OS, still have ubuntu but not so often using it,
yes gibbocol, thats ... |
|
|
|
y3dips |
|
Replies: 6 |
Views: 23216 |
|
|
 |
 |
 |
|
yes, true.. till u die, there will no sql statement take effect
its a RFI bug, Remote file Inclusion!
read again slowly
regards
--
y3dips |
|
|
|
y3dips |
|
Replies: 4 |
Views: 23521 |
|
|
 |
 |
 |
|
most of it
better to create your own web shell
and thats not only in web shell, also in most of exploits (hide under shellcode? for example)  |
|
|
|
y3dips |
|
Replies: 2 |
Views: 14359 |
|
|
 |
 |
 |
|
A Salute to all the hackerZ,
I am a newbie to RFI .... thouugh i have a few shells but i have no idea how to find RFi exploit in any site and then how to execute it...
Kindly help me out.
its bet ... |
|
|
|
y3dips |
|
Replies: 4 |
Views: 15984 |
|
|
 |
 |
 |
|
FYI,
ive done creating the pacth for the newest version, which is easier to implement.
go get it here http://code.google.com/p/recaptcha-php-fusion/
thxs |
|
|
|
y3dips |
|
Replies: 4 |
Views: 15984 |
|
|
 |
 |
 |
|
now, ive create the patch file, so its easy to install
check this out
http://e-rdc.org/temp/contact-recaptcha/
enjoy! |
|
|
|
y3dips |
|
Replies: 24 |
Views: 101276 |
|
|
 |
 |
 |
|
some of perl says:
C:\perl1>perl exploit.pl
Can't exec /usr/bin/php at exploit.pl line 1.
what is the problemm ?
install and define your php path,
thats what the error tell you abo ... |
|
|
|
y3dips |
|
Replies: 3 |
Views: 11238 |
|
|
 |
 |
 |
|
like waraxe said, yep .. thats the thing goes work
easy way is MITM, just fake one of the certificate, n hope the user wont notice
(90%) of them just ignore the error warning
easy way, use cai ... |
|
|
|
y3dips |
|
Replies: 4 |
Views: 15984 |
|
|
 |
 |
 |
|
Hi, long time since you last posted something
See ya
Hi, too.. yeah its been hard for me, u know.. working and working, sorry if im not so active for that long
anyway, nice to see ... |
|
|
|
y3dips |
|
Replies: 4 |
Views: 15984 |
|
|
 |
 |
 |
|
Hello all,
waraxe: sorry if i post in the wrong place, coz i dont find any php fusion room
ok, if some of u guys are using PHP fusion as your web engine, then the default contact.php page do ... |
|
|
|
y3dips |
|
Replies: 0 |
Views: 12403 |
|
|
 |
 |
 |
|
its a planet for web security blogs
http://planet-websecurity.org/
enjoy! |
|
|
|
y3dips |
|
Replies: 0 |
Views: 12734 |
|
|
 |
 |
 |
|
Rsnake from ha.ckers.org made a great Cheat sheet about this
"This page is for people who already understand the basics of XSS attacks but want a deep understanding of the nuances regarding filter ... |
|
|
Page 1 of 19 |
Goto page 1, 2, 3 ... 17, 18, 19Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|