baris

470 posts

baris

baris

@b9r7s

always the summers are slipping away

Katılım Ekim 2025
244 Takip Edilen54 Takipçiler
Sabitlenmiş Tweet
baris
baris@b9r7s·
a winner is just a loser who tried once more
English
0
0
1
1K
ph
ph@wiredaddict·
supplychain, rce, auth bypass, cred exfiltration, command injection, takeover, buffer overflow, ssti dur!
ph tweet media
International Cyber Digest@IntCyberDigest

🚨 BREAKING: cPanel and WHM, the control panels behind an estimated 70+ million websites, have a critical security flaw that lets anyone become root admin without a password. CVE-2026-41940 affects every supported version. It’s already being exploited in the wild. watchTowr Labs published the full attack today, after the hosting company KnownHost confirmed the bug was already being used to break into a significant chunk of the internet. If you've never heard of cPanel: it's the dashboard that hosting providers and millions of website owners use to manage their servers, domains, email accounts, databases, and SSL certificates. WHM is the admin version that controls the entire server. If someone gets root access to WHM, they get the keys to the kingdom and to every apartment inside it. How the attack works, in plain English: 🔴 Step 1: The attacker sends a deliberately wrong login. cPanel still creates a temporary "you tried to log in" record on disk and gives the attacker a cookie tied to it. 🔴 Step 2: The attacker tweaks the cookie to disable cPanel's password encryption. Normally cPanel encrypts the password field on disk. With one small change to the cookie, cPanel just stores it as plain text instead. 🔴 Step 3: The attacker sends a fake login attempt where the password field secretly contains hidden line breaks. cPanel does not strip these line breaks out, so they get written straight to the session file. Each line break creates a brand new fake record. The attacker uses this to inject lines that say "this user is root" and "this user already authenticated successfully." 🔴 Step 4: The attacker visits one more random page on the site to nudge cPanel into re-reading the file. cPanel then promotes the injected fake lines into its main session memory. 🔴 Step 5: On the next request, cPanel sees a flag that says "this user already passed the password check." cPanel trusts that flag, skips checking the actual password, and lets the attacker in as root. From start to finish, the attack takes a handful of HTTP requests. If you run cPanel or WHM, the patched versions are: 🔴 cPanel/WHM 110.0.x → 11.110.0.97 🔴 cPanel/WHM 118.0.x → 11.118.0.63 🔴 cPanel/WHM 126.0.x → 11.126.0.54 🔴 cPanel/WHM 132.0.x → 11.132.0.29 🔴 cPanel/WHM 134.0.x → 11.134.0.20 🔴 cPanel/WHM 136.0.x → 11.136.0.5 If your version is older than these, assume someone has already broken in and act accordingly. Patch right now, then rotate every password and key the server touched: root passwords, API tokens, SSL private keys, SSH keys, mail passwords, and database passwords.

English
2
1
8
1.1K
baris
baris@b9r7s·
one more ui component and we will be ok.
English
0
0
0
14
baris
baris@b9r7s·
esp32
baris tweet media
0
0
2
28
baris
baris@b9r7s·
the sun will always rise again
English
0
0
0
18
baris
baris@b9r7s·
@temidaradev twitin baya rage/engagement bait fakat kafana göre takıl
Türkçe
0
0
1
50
Temidaradev
Temidaradev@temidaradev·
@b9r7s Ragebait değil debian tabanlı herşey çöp
Türkçe
2
0
1
310
baris
baris@b9r7s·
@robiot @mel_sol1 better response would be: "oh, we can give you 10 dollar refund"
English
0
0
1
20
Elliot Lindberg
Elliot Lindberg@robiot·
you can now buy domains directly on Lovable to celebrate we’re letting you grab a domain for $1 for a limited time. Get one now before it's too late! been insanely fun building this with the team & so excited to finally share it
Elliot Lindberg tweet media
English
44
19
475
56.2K
baris
baris@b9r7s·
@0xMWR nice ragebait 3/10
English
0
0
1
447
Sezer İltekin
Sezer İltekin@sezeriltekin·
Bir domainin başına herhangi bir kelime ekleyince başka bir web sitesine gitmiş oluyorsun. Şunu kavrayamayan insanların bu zeka seviyesiyle nasıl hayatta kaldığına bazen şaşırıyorum.
BGY@bgyetherr

İnterneti keşfediyoruz

Türkçe
68
9
1.3K
280.8K
baris
baris@b9r7s·
in chains, entombed
English
0
0
2
43
wukko
wukko@uwukko·
do you use screen time on apple devices, and would you like to see @heliumbrowser support it?
English
101
2
674
35.1K
baris
baris@b9r7s·
çoksa ver yoksa al
Türkçe
3
0
1
88
baris retweetledi
the
the@Amanseeks·
ZXX
90
7.7K
57K
744.6K
baris
baris@b9r7s·
@fatihguzeldev dunyanin en dogru yorumu. hicbir dogru duzgun packagesi yok. hicbir telefonla dogru duzgun uyumu yok. responsiveness hak getire. nefret otesi bi teknoloji
Türkçe
1
0
1
1K
fatih
fatih@fatihguzeldev·
hayatımda bir daha uğraşmak istemeyeceğim iki şey: - pwa - service worker kimin aklına gelmiş acaba bu pwa fikri :d
Türkçe
13
0
60
19.2K
Talha Dilber
Talha Dilber@talha_dilber·
@mstrYoda_ Qwen 3.6-27B neredeyse. Opus 4.5 seviyelerine geldi. Biraz baktım 5090 ile Q6 (en kayıpsız optimum quantization) da 50 token/s alan varmış. Zaten şuanda bir çok servis ortalamada 50 token/s veriyor. Ben 35B yi Q3 ile kullanıyorum bayağı iyi çalışıyor. Claude code rahat çalışıyor
Talha Dilber tweet media
Türkçe
5
0
8
2.8K
Ludwig
Ludwig@Ludwig1301·
mii kesit
Ludwig tweet media
Indonesia
2
0
5
43
baris retweetledi
azra
azra@IHATEKITSU·
azra tweet media
ZXX
0
61
237
2.9K