Search the Community

Showing results for tags 'system'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 87 results

  1. BSI Advance Hotel Booking System version 2.0 suffers from a persistent cross site scripting vulnerability in booking_details.php. View the full article
  2. College Notes Management System version 1.0 suffers from a cross site request forgery vulnerability. View the full article
  3. Parrot Security OS is a security-oriented operating system, which is designed for infiltration testing, computer forensics, reverse engineering, attack, cloud penetration testing, privacy / anonymous, password, and other occasions. The release is based on Debian, which features the MATE desktop environment and developed by the Frozen box network. Lorenzo Faletra announces the release of Parrot Security OS 4.7, a security-oriented operating system designed for penetration testing, computer forensics, reverse engineering, attacks, cloud penetration testing, privacy/anonymity, passwords and more. The distribution is based on Debian, which features the MATE desktop environment and was developed by the Frozen box network. [HIDE][Hidden Content]]
  4. Link is a social network used to improve the collaboration, and communication between a groups of people. It allows them to interact, socialize, share and consume information, thoughts and ideas. In addition, it combines individuals into specific groups like a neighborhood subdivision. Link provides an opportunity for the community such as high school, universities, institutions, governments, non-government institution and others to engage. It also contains many features used to facilitate user interaction and collaboration. Some of these features include: posting, comment on the post, real-time chat session, voting, user profile, and focusing groups. Demo: [Hidden Content] [HIDE][Hidden Content]]
  5. Whonix v15 - Anonymous Operating System 20 hrs ago 8:52 AM | Post sponsored by FaradaySEC | Multiuser Pentest Environment Zion3R Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. After approximately one year of development, the Whonix Project is proud to announce the release of Whonix 15. Whonix 15 is based on the Debian buster (Debian 10) distribution. This means users have access to many new software packages in concert with existing packages, such as a modern branch of GNuPG, and more. Major Changes and New Features port Whonix from Debian stretch to Debian buster 5 kernel hardening 7 Blacklist uncommon network protocols 6 systemd unit sandboxing 5 improve entropy collection through extensive research and installation by default of jitterentropy-rngd 3 research implications of spectre / meltdown / retpoline / L1 Terminal Fault (L1TF) 5 vs Whonix Non-Qubes-Whonix: kloak - Keystroke Anonymization Tool 5 Non-Qubes-Whonix: Whonix Live 3 / Live Mode Indicator / grub-live / grub-default-live 1 Non-Qubes-Whonix: switch desktop environment from KDE to XFCE (poll 2) (other desktop environments 3) Non-Qubes-Whonix: reduced image size using zerofree 2 Whonix VirtualBox: CLI version 2 (Whonix ™ with CLI is a version suited for advanced users – those who want Whonix ™ without a GUI.) Whonix VirtualBox: unified ova downloads 5 Qubes-Whonix: change Qubes-Whonix default applications from KDE-ish to XFCE-ish 5 Qubes-Whonix: simplify installation of VM kernel 2 by installing the same recommended Qubes packages as Qubes Debian packages (source 1 (source 2) Whonix KVM: serial console support 3 update sdwdate time sources 1 List of processed Whonix 15 tickets arm64 / RPi 5 port install by default zulucrypt, qtox, onionshare, keepassxc, firejail new usability wrappers: scurlget 1, curlget, pwchange, upgrade-nonroot 1, apt-get-noninteractive, apt-get-update-plus remove mixmaster, ricochet since dead upstream support for Bisq - The P2P Exchange Network 4 port build script to cowbuilder; build packages in chroot and use mmdebstrap for better security add UsrMerge compatibility [Hidden Content]
  6. FaceSentry Access Control System version 6.4.8 credentials used for accessing the web front end are stored unencrypted on the device in /faceGuard/database/FaceSentryWeb.sqlite. View the full article
  7. FaceSentry Access Control System version 6.4.8 suffers from a cleartext transmission of sensitive information. This allows a remote attacker to intercept the HTTP Cookie authentication credentials via a man-in-the-middle attack. View the full article
  8. FaceSentry Access Control System version 6.4.8 is vulnerable to multiple cross site scripting vulnerabilities. This issue is due to the application's failure to properly sanitize user-supplied input thru the 'msg' parameter (GET) in pluginInstall.php script. An attacker may leverage any of the cross-site scripting issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials, phishing, as well as other attacks. View the full article
  9. FaceSentry Access Control System version 6.4.8 facial biometric access control appliance ships with hard-coded and weak credentials for SSH access on port 23445 using the credentials wwwuser:123456. The root privilege escalation is done by abusing the insecure sudoers entry file. View the full article
  10. FaceSentry Access Control System version 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script. View the full article
  11. The FaceSentry Access Control System version 6.4.8 application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. View the full article
  12. FaceSentry Access Control System version 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' and 'strInPort' parameters (POST) in pingTest and tcpPortTest PHP scripts. View the full article
  13. Dell KACE System Management Appliance (SMA) versions prior to 9.0.270 patch SEC2018_20180410 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  14. Darktrace Enterprise Immune System versions 3.0.9 and 3.0.10 contain multiple cross site request forgery vulnerabilities. It is highly likely that older versions are affected as well, but this has not been confirmed. An attacker can whitelist domains and/or change core Darktrace configuration. View the full article
  15. This is the systemd-journald exploit produced by Qualys that demonstrates the vulnerabilities as highlighted in CVE-2018-16865 and CVE-2018-16866. View the full article
  16. SOCA Access Control System version 180612 suffers from a cross site request forgery vulnerability. View the full article
  17. SOCA Access Control System version 180612 suffers from remote SQL injection vulnerabilities that allow for authentication bypass. View the full article
  18. SOCA Access Control System version 180612 suffers from a cross site scripting vulnerability. View the full article
  19. SOCA Access Control System version 180612 suffers from insecure direct object reference vulnerabilities that leak information like password hashes. View the full article
  20. Prinect Archive System 2015 release 2.6 suffers from a cross site scripting vulnerability. View the full article
  21. OpenSkos Simple Knowledge Organization System version 2.0 suffers from a database configuration file disclosure vulnerability. View the full article
  22. Sentrifugo Human Resource Management System version 3.2 suffers from a database configuration file disclosure vulnerability. View the full article
  23. OpenDocMan Document Management System version 1.3.5 suffers from a database disclosure vulnerability. View the full article
  24. NIT-Warangal Dispensary Management System India version 1.0 suffers from a database disclosure vulnerability. View the full article
  25. Opus Online Placement University System version 4.2.0 suffers from a database disclosure vulnerability. View the full article