"Locale problems" in both the 32-bit & 64-bit versions of Debian 8 droplets
Create a new Debian 8 droplet and login as root
:
[Summary] | |
I have discovered a Cross-Site Scripting (XSS) vulnerability in vBulletin latest version 6.0.0, which also impacts lower versions. The vulnerability allows an attacker to inject malicious scripts into the Admin Control Panel, potentially leading to unauthorized access, data theft, or further exploitation. | |
[Description] | |
The XSS vulnerability can be triggered when an authenticated user accesses to path `/admincp` and try to login to the Admin Control Panel. The vulnerability is due to inadequate input sanitization, allowing an attacker to inject malicious scripts that will execute in the context of the targeted administrator's session so as to hijack admin's credential. | |
[Steps to Reproduce] | |
1. Log in /admincp in vBulletin Admin Control Panel. | |
2. Through the 'url' parameter, it is possible to inject JS code to escape, bypass white space then trigger XSS. |
#!/bin/bash | |
# requirements: webp (sudo apt install webp or yum install webp) | |
# version 1.3 | |
# version 1.3 | |
# - date: 2020-05-28 | |
# - change the logic litte bit to make the output less noisy | |
# version 1.2 | |
# - date: 2020-05-28 |
<?php | |
$sitemapURL = 'https://www.tinywp.in/sitemap.xml'; | |
/** | |
* fetch all URLs from sitemap.xml | |
*/ | |
$xmlobject = simplexml_load_file($sitemapURL); |
#!/bin/bash | |
# What it is: a script to compile and install Nginx manually in Ubuntu 14.04 server | |
# Author: Pothi Kalimuthu | |
# Author URL: http://pothi.info | |
# License: GPL v2 | |
### VARIABLES ### | |
# Please know that this script should be executed as normal user with __sudo__ privileges. |
#!/bin/bash | |
# Script to automate PhpMyAdmin updates | |
# To manually switch to another version, use... | |
# bash pma-auto-update.sh version_number | |
### Variables | |
LOGDIR=$HOME/log | |
LOG_FILE=$LOGDIR/phpmyadmin-updates.log |