![]() |
VBulletin Zero Day Exploit
Are you guys impacted by this zero day vbulletin exploit?
http://thehackernews.com/2013/11/vBu...erability.html I see FlyerTalk in the screenshot. Thought I would share with you guys |
Where do you see FT screenshots?
|
In the second screen shot... 10 lines down...
|
Originally Posted by TravelingPeanut
(Post 21805634)
In the second screen shot... 10 lines down...
I run a (smaller!) forum myself and I was reading about the issue and saw your name here and thought I would make sure you guys were aware. |
Originally Posted by TravelingPeanut
(Post 21805634)
In the second screen shot... 10 lines down...
http://1.bp.blogspot.com/-dSa8VbU8dP...cked+shell.png A cursory check of the posted usernames doesn't ring a bell though... just try here: http://www.flyertalk.com/forum/search.php |
Originally Posted by oliver2002
(Post 21805916)
This one?
http://1.bp.blogspot.com/-dSa8VbU8dP...cked+shell.png A cursory check of the posted usernames doesn't ring a bell though... just try here: http://www.flyertalk.com/forum/search.php those usernames are server usernames, not forum usernames. They indicate root access. This has hit some big forums and I just wasn't sure if you guys saw it or not. Potentially could involve theft of everyone's user ID's and password combo |
| All times are GMT -6. The time now is 1:06 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.