Search the Community

Showing results for tags 'management'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 58 results

  1. College Notes Management System version 1.0 suffers from a cross site request forgery vulnerability. View the full article
  2. This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) [HIDE][Hidden Content]]
  3. Dell KACE System Management Appliance (SMA) versions prior to 9.0.270 patch SEC2018_20180410 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  4. Quest KACE Systems Management Appliance versions 9.0 and below suffer from a cross site scripting vulnerability. View the full article
  5. Sentrifugo Human Resource Management System version 3.2 suffers from a database configuration file disclosure vulnerability. View the full article
  6. OpenDocMan Document Management System version 1.3.5 suffers from a database disclosure vulnerability. View the full article
  7. NIT-Warangal Dispensary Management System India version 1.0 suffers from a database disclosure vulnerability. View the full article
  8. A vulnerability in the web-based management interface of the Cisco RV130W Wireless-N Multifunction VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. Note: successful exploitation may not result in a session, and as such, on_new_session will never repair the HTTP server, leading to a denial-of-service condition. View the full article
  9. OrangeScrum Project Management Software version 1.6.1 suffers from a database disclosure vulnerability. View the full article
  10. Dell KACE Systems Management Appliance (K1000) version 6.4.120756 unauthenticated remote code execution exploit. View the full article
  11. This Metasploit module allows the execution of remote commands on the server by creating a malicious JSP file. Module has been tested successfully with OpenKM DM between 6.3.2 and 6.3.7 on Debian 4.9.18-1kali1 system. There is also the possibility of working in lower versions. View the full article
  12. 1C-Bitrix Site Management Russia version 2.0 suffers from an open redirection vulnerability. View the full article
  13. The Nuuo Central Management Server allows an authenticated user to query the state of the alarms. This functionality can be abused to inject SQL into the query. As SQL Server 2005 Express is installed by default, xp_cmdshell can be enabled and abused to achieve code execution. This module will either use a provided session number (which can be guessed with an auxiliary module) or attempt to login using a provided username and password - it will also try the default credentials if nothing is provided. View the full article
  14. The COMMITCONFIG verb is used by a CMS client to upload and modify the configuration of the CMS Server. The vulnerability is in the FileName parameter, which accepts directory traversal (..\\..\\) characters. Therefore, this function can be abused to overwrite any files in the installation drive of CMS Server. This vulnerability is exploitable in CMS versions up to and including 2.4. View the full article
  15. Slims CMS Senayan Library Management System version 7.0 suffers from a remote shell upload vulnerability. View the full article
  16. Ispirithalaya Hospital Management System version 0.1.2 suffers from a database configuration file disclosure vulnerability. View the full article
  17. Rukovoditel Project Management CRM version 2.4.1 suffers from a cross site scripting vulnerability. View the full article
  18. Rukovoditel Project Management CRM version 2.4.1 suffers from a remote SQL injection vulnerability. View the full article
  19. Cisco Firepower Management Center versions 6.2.2.2 and 6.2.3 suffer from a cross site scripting vulnerability. View the full article
  20. Teameyo Project Management System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  21. Mess Management System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  22. Coman Company Management System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  23. HealthNode Hospital Management System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  24. Adapt Inventory Management System version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  25. MyT Project Management version 1.5.1 suffers from a remote SQL injection vulnerability. View the full article