Search the Community

Showing results for tags 'Exploits'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 1,645 results

  1. Tautulli version 2.1.26 suffers from a cross site scripting vulnerability. View the full article
  2. Quest NetVault Backup Server versions prior to 11.4.5 suffer from process manager service SQL injection and remote code execution vulnerabilities. View the full article
  3. HanYazilim Paper Submission System .NET version 1.0 suffers from a remote shell upload vulnerability. View the full article
  4. The Nuuo Central Management Server allows an authenticated user to query the state of the alarms. This functionality can be abused to inject SQL into the query. As SQL Server 2005 Express is installed by default, xp_cmdshell can be enabled and abused to achieve code execution. This module will either use a provided session number (which can be guessed with an auxiliary module) or attempt to login using a provided username and password - it will also try the default credentials if nothing is provided. View the full article
  5. MatrixSSL suffers from a stack buffer overflow vulnerability when verifying x.509 certificates. View the full article
  6. WebKit JSC has an issue where reifyStaticProperty needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter. View the full article
  7. MikroTik RouterOS versions prior to 6.43.12 (stable) and 6.42.12 (long-term) firewall and NAT bypass exploit. View the full article
  8. ScreenStream version 3.0.15 suffers from a denial of service vulnerability. View the full article
  9. C4G Basic Laboratory Information System (BLIS) version 3.4 suffers from a remote SQL injection vulnerability. View the full article
  10. Virtual VCR Max version .0a suffers from a buffer overflow vulnerability. View the full article
  11. 1337day-Exploits

    Exploits AirDrop 2.0 Denial Of Service

    AirDrop version 2.0 suffers from a denial of service vulnerability. View the full article
  12. Medical Store Script version 3.0.3 suffers from a cross site scripting vulnerability. View the full article
  13. WordPress Village theme version 5.0 suffers from cross site request forgery, backdoor access, and remote SQL injection vulnerabilities. View the full article
  14. Typo3 CMS Modern Guestbook tx_veguestbook_pi1 version 3.3.0 suffers from a remote SQL injection vulnerability. View the full article
  15. Joomla AdsManager component version 3.2.0 suffers from cross site request forgery, database disclosure, remote file inclusion, and remote SQL injection vulnerabilities. View the full article
  16. Drupal Pubdlcnt module version 7.x-1.2 suffers from an open redirection vulnerability. View the full article
  17. Valentina Studio version 9.0.5 suffers from a buffer overflow vulnerability. View the full article
  18. RealTerm Serial Terminal version 2.0.0.70 suffers from an echo port buffer overflow vulnerability. View the full article
  19. 1337day-Exploits

    Exploits EI-Tube 3 SQL Injection

    EI-Tube version 3.0 suffers from a remote SQL injection vulnerability. View the full article
  20. Micro Focus Filr version 3.4.0.217 suffers from privilege escalation and path traversal vulnerabilities. View the full article
  21. A multitude of security issues exist within STMicroelectronics DVB chipsets including, but not limited to credential leakage, buffer overflow, and data leaks. This is the full release of both the whitepaper and dozens of proof of concept details. View the full article
  22. Teracue ENC-400 suffers from hard-coded credential, missing authentication, and command injection vulnerabilities. View the full article
  23. VertrigoServ version 2.17 suffers from a cross site scripting vulnerability. View the full article
  24. Advanced Comment System version 1.0 suffers from a cross site scripting vulnerability. View the full article
  25. Kanboard version 1.2.7 contains multiple vulnerabilities. The vulnerabilities include CSV account import cross site request forgery which allows an unauthenticated attacker to create a new administrative user. Cross site request forgery 2FA deactivation, allowing an unauthenticated attacker to disable an account's 2FA configuration. A lack of integrity checking or transport layer encryption enforced on plugins enables remote code execution by a malicious admin. Other vulnerabilities include: session privilege retention, 2FA bypass, database user_id and pre-2FA information disclosure. View the full article