Search the Community

Showing results for tags 'code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 130 results

  1. This Metasploit module exploits a vulnerability in Jenkins dynamic routing to bypass the Overall/Read ACL and leverage Groovy metaprogramming to download and execute a malicious JAR file. The ACL bypass gadget is specific to Jenkins versions 2.137 and below and will not work on later versions of Jenkins. Tested against Jenkins 2.137 and Pipeline: Groovy Plugin 2.61. View the full article
  2. Moodle version 3.4.1 remote code execution exploit. View the full article
  3. Apache UNO with LibreOffice version 6.1.2 and OpenOffice version 4.1.6 API remote code execution exploit. View the full article
  4. Pegasus CMS version 1.0 suffers from a code execution vulnerability in extra_fields.php. View the full article
  5. FTPGetter Standard version 5.97.0.177 suffers from a remote code execution vulnerability. View the full article
  6. itsMe?

    Junk Code Gen

    [Hidden Content]
  7. The Microsoft Windows MSHTML Engine is prone to a vulnerability that allows attackers to execute arbitrary code on vulnerable systems because of improper validation of specially crafted web documents (html, xhtml, etc). View the full article
  8. BEopt suffers from a DLL Hijacking issue. The vulnerability is caused due to the application loading libraries (sdl2.dll and libegl.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into opening a related application file .BEopt located on a remote WebDAV or SMB share. Version 2.8.0 is affected. View the full article
  9. PRTG Network Monitor version 18.2.38 authenticated remote code execution exploit. View the full article
  10. USER:PASS + MAIL:PASS Public proxies work fine [HIDE][Hidden Content]]
  11. Whitepaper discussing Flexpaper versions 2.3.6 and below which suffer from a remote code execution vulnerability. View the full article
  12. itsMe?

    Visual Studio Code 1.32.0 x86/x64

    Info + Demo: [Hidden Content] February 2019 (version 1.32) [Hidden Content]updates/v1_32 [Hidden Content] Pass: level23hacktools.com
  13. Sony PlayStation 4 (PS4) versions prior to 6.20 webkit code execution proof of concept exploit. View the full article
  14. [Hidden Content]
  15. [Hidden Content]
  16. phpBB version 3.2.3 remote code execution exploit. View the full article
  17. This Metasploit module exploits a PHP unserialize() vulnerability in Drupal RESTful Web Services by sending a crafted request to the /node REST endpoint. As per SA-CORE-2019-003, the initial remediation was to disable POST, PATCH, and PUT, but Ambionics discovered that GET was also vulnerable (albeit cached). Cached nodes can be exploited only once. View the full article
  18. itsMe?

    C code metamorphic obfuscator

    [Hidden Content]
  19. Java Debug Wire Protocol (JDWP) remote code execution exploit. View the full article
  20. Splunk Enterprise version 7.2.4 custom application remote code execution exploit using a persistent backdoor with a custom binary payload. View the full article
  21. Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 remote code execution proof of concept exploit. View the full article
  22. Drupal versions 8.6.9 and below REST service remote code execution proof of concept exploit. View the full article
  23. ZZZPHP CMS version 1.6.1 suffers from a remote code execution vulnerability. View the full article
  24. Jenkins plugins Script Security version 1.49, Declarative version 1.3.4, and Groovy version 2.60 suffer from a code execution vulnerability. View the full article
  25. Drupal versions prior to 8.6.10 and 8.5.11 suffer from a REST module remote code execution vulnerability. View the full article