 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 116
Members: 0
Total: 116
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
vBulletin 3.6.8 patch2 Admin panel upload shell |
 |
Posted: Mon Feb 04, 2008 8:24 pm |
|
|
gtal3x |
Active user |

 |
|
Joined: Dec 03, 2007 |
Posts: 33 |
Location: Ukraine |
|
|
 |
 |
 |
|
Hello every1, I was able to get into admin panel in vBulletin 3.6.8 patch2, now i wont to upload shell to the server, i have tryed so but no success, anyone got any idea how to do this? |
|
|
|
|
Posted: Tue Feb 05, 2008 6:42 am |
|
|
pexli |
Valuable expert |

 |
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
 |
 |
 |
|
Admin panel>>plugins>>new plugin and put clear php code without <?php ?>.You find your code here victiom.com/path/ajax.php
Recomend you to put header's shell not some c99 or some other shitt like that. |
|
|
|
|
Posted: Thu Feb 07, 2008 10:15 pm |
|
|
gtal3x |
Active user |

 |
|
Joined: Dec 03, 2007 |
Posts: 33 |
Location: Ukraine |
|
|
 |
 |
 |
|
koko thx fro reply, i did everything you said, i wrote: echo "Test"; (just to test it), then i went to site.com/forum/ajax.php but nothing came up... What did i do wrong? |
|
|
|
|
Posted: Fri Feb 08, 2008 9:36 am |
|
|
pexli |
Valuable expert |

 |
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
 |
 |
 |
|
Put some web shell without <?php ?>. |
|
|
|
|
Posted: Fri Feb 08, 2008 12:53 pm |
|
|
gtal3x |
Active user |

 |
|
Joined: Dec 03, 2007 |
Posts: 33 |
Location: Ukraine |
|
|
 |
 |
 |
|
I tryed ntsview and r57... They dident work... But PHP works, just tryed echo"Test"; and it worked..! Do you have any good shell i can upload? |
|
|
|
|
Posted: Fri Feb 08, 2008 1:04 pm |
|
|
nox |
Advanced user |

 |
|
Joined: Dec 29, 2007 |
Posts: 100 |
Location: c://windows/system32 |
|
|
 |
 |
 |
|
hey , please i need exploit to hack vbulletin 3.6.8  |
|
_________________ ..::::[ Waraxe.us is the BEST and the TOP ]::::.. |
|
|
|
Posted: Fri Feb 08, 2008 1:19 pm |
|
|
pexli |
Valuable expert |

 |
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
 |
 |
 |
|
gtal3x in most cases antivirus cut r57 or some other shitt's.Try something simple.Like system("cmd"); or passthru("cmd"); I think you know how to work with this.
nox stop this spam in all threads. |
|
|
|
|
Posted: Fri Feb 08, 2008 1:26 pm |
|
|
gtal3x |
Active user |

 |
|
Joined: Dec 03, 2007 |
Posts: 33 |
Location: Ukraine |
|
|
 |
 |
 |
|
koko thnx for help, i managed to make it work...! |
|
|
|
|
Posted: Tue Apr 01, 2008 5:35 pm |
|
|
akrlot |
Beginner |

 |
|
Joined: Apr 01, 2008 |
Posts: 4 |
|
|
|
 |
 |
 |
|
could you pm me the exploit u used .thx |
|
|
|
|
Posted: Wed Apr 02, 2008 3:20 pm |
|
|
kieuanh |
Regular user |

 |
|
Joined: Mar 22, 2008 |
Posts: 23 |
|
|
|
 |
 |
 |
|
maybe local attack  |
|
|
|
|
Posted: Mon Apr 07, 2008 12:50 pm |
|
|
akrlot |
Beginner |

 |
|
Joined: Apr 01, 2008 |
Posts: 4 |
|
|
|
 |
 |
 |
|
hello;
you can ulpoad c99 xml shell.i have the rquired files+video tutorial.
i will trade it for the vb 3.6.8 ptch level2 exploit. if you are
interested let me know |
|
|
|
|
Posted: Sat May 10, 2008 11:37 pm |
|
|
bleh |
Regular user |

 |
|
Joined: Apr 19, 2008 |
Posts: 19 |
|
|
|
 |
 |
 |
|
does anyone got a working shell? Mine doesn't work  |
|
|
|
|
www.waraxe.us Forum Index -> vBulletin Board
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|