Search the Community

Showing results for tags 'file'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 168 results

  1. Joomla JS Jobs component version 1.2.6 suffers from an arbitrary file deletion vulnerability. View the full article
  2. Integria IMS version 5.0.86 suffers from an arbitrary file upload vulnerability that allows for remote command execution. View the full article
  3. Microsoft Windows 10 AppXSvc Deployment Service suffers from an arbitrary file deletion vulnerability. View the full article
  4. Joomla JS Support Ticket component version 1.1.6 suffers from an arbitrary file deletion vulnerability in ticket.php. View the full article
  5. An issue was discovered in osTicket versions before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. View the full article
  6. Joomla JS Support Ticket component version 1.1.5 suffers from an arbitrary file download vulnerability. View the full article
  7. Aptana Jaxer version 1.0.3.4547 suffers from a local file inclusion vulnerability. View the full article
  8. ATutor version 2.2.4 suffers from a language_import arbitrary file upload that allows for command execution. View the full article
  9. This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be exploited in Windows and Linux environments to get remote code execution (usually as SYSTEM). This module has been tested successfully on Ahsay Backup v8.1.1.50 with Windows 2003 SP2 Server. Because of this flaw all connected clients can be configured to execute a command before the backup starts. Allowing an attacker to takeover even more systems and make it rain shells! View the full article
  10. This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be exploited in Windows and Linux environments to get remote code execution (usually as SYSTEM). This module has been tested successfully on Ahsay Backup v8.1.1.50 with Windows 2003 SP2 Server. Because of this flaw all connected clients can be configured to execute a command before the backup starts. Allowing an attacker to takeover even more systems and make it rain shells! View the full article
  11. Ahsay Backup versions 7.x through 8.1.1.50 suffer from authenticated arbitrary file upload and remote code execution vulnerabilities. View the full article
  12. [Hidden Content]
  13. Microsoft compiled HTML Help and uncompiled .chm files can be leveraged for XML external entity injection attacks. View the full article
  14. 1337day-Exploits

    Exploits FlightPath Local File Inclusion

    FlightPath versions prior to 4.8.2 and 5.0-rc2 suffer from a local file inclusion vulnerability. View the full article
  15. Works with Native & .net files binded [HIDE][Hidden Content]]
  16. Karenderia CMS version 5.1 suffers from a local file inclusion vulnerability. View the full article
  17. Microsoft File Checksum Verifier version 2.05 suffers from a dll hijacking vulnerability. View the full article
  18. This script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg database is created in the current directory based on the extracted labels. The LST file can be generated in IDA from the File menu: Produce file -> Create LST file... [HIDE][Hidden Content]]
  19. ONESERVERS.SU [HIDE][Hidden Content]] ZOROTEX.ORG SQL [HIDE][Hidden Content]]
  20. [HIDE][Hidden Content]]
  21. Microsoft Windows suffers from a CmpAddRemoveContainerToCLFSLog arbitrary file and directory creation vulnerability that allows for elevation of privilege. View the full article
  22. GrandNode versions 4.40 and below suffer from arbitrary file download and path traversal vulnerabilities. View the full article
  23. When a Microsoft Word ".docx" File contains a hyperlink to another file, it will run the first file it finds in that directory with a valid extension. But will present to the end user an extension-less file in its Security warning dialog box without showing the extension type. If another "empty" file of the same name as the target executable exists but has no file extension. Because the extension is suppressed it makes the file seem harmless and the file can be masked to appear as just a folder etc. This can potentially trick user into running unexpected code, but will only work when you have an additional file of same name with NO extension on it. View the full article
  24. Polymorph file protector Aika Crypter AES-256 encryption algorithm Anti VM implementation Polymorph .net / native crypter Uses ConfuserEx for obfuscation RunPE method implementation Builder [Hidden Content]
  25. [Hidden Content]