 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 184
Members: 0
Total: 184
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Contacts vBulletin |
 |
Posted: Tue Jun 24, 2008 11:41 pm |
|
|
lordtopcat |
Regular user |

 |
|
Joined: Dec 02, 2006 |
Posts: 8 |
|
|
|
 |
 |
 |
|
Hey Guys,
Does anyone know how vBulletin contacts their base and tells them where it's running? I have a leased license and have been caught using it on a few different domains. Does anyone know what I can remove so it doesn't tell them where it's running?
I know nulled versions have this.
Cheers,
LTC |
|
|
|
|
Posted: Thu Aug 21, 2008 8:06 am |
|
|
0verl0rd |
Beginner |

 |
|
Joined: Aug 21, 2008 |
Posts: 1 |
|
|
|
 |
 |
 |
|
Yeah there are callbacks and hotlinks, a few ways they can get you.
The thing is, why do you even fucking bother with your version, go get a DGT null, check it's verification, generate a valid looking license and run from that NULLED version instead of fucking around with some version you feel attached too because you coughed up some cash at some stage.
Fuck man don't waste your time nulling that shit if you have no idea either. |
|
|
|
|
 |
 |
|
 |
Posted: Fri Aug 22, 2008 2:03 pm |
|
|
lenny |
Valuable expert |

 |
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
 |
 |
 |
|
This is a security community, not a cracking or warez board.
Support developers, but their software. Its a little to ask, but how are programmers supposed to feed their families without your support?
Anyway, Nulling can be very complicated - I have never used vBulletin so I wouldn't know how it is coded, but programmers use very sneaky ways of checking the validity of software licenses. If you *really* have to use illegal software (be it on your own head, and on your own conscience) then use a professionally nulled version, dont try and do it yourself - you could end up in a *lot* of trouble if you try and fail to do it yourself. I wont point to any good sources of good nulled versions, but im sure you already know a few places. |
|
|
|
|
 |
www.waraxe.us Forum Index -> vBulletin Board
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|