![]() |
vB Exploit
Hey,
Thinking vb3 has an exploit. All my users got moved into admin (I'm the only admin, locked admincp, moved it etc), tried shelling it with a gif.pp file, .htaccess blocked php so they couldn't get it, after that, all users were admin. no idea why, any ideas of exploits? i had hooks enabled (so had no plugins running, in fact no plugin files were on, default vbull) path level 2, 3.8.7 - cheers! |
your server not secure?
your url? |
i can give u a seacure VPS and secure your vbulletin
call me |
Close the site or get better security.
|
Have you gone through your access_logs to how they got in?
|
All times are GMT. The time now is 10:22 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|