Search the Community

Showing results for tags 'file'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 126 results

  1. Sony Smart TVs suffer from information disclosure and arbitrary file read vulnerabilities. View the full article
  2. Joomla versions 1.5.0 through 3.9.4 suffer from arbitrary file deletion and directory traversal vulnerabilities. View the full article
  3. This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact files. View the full article
  4. Email/User: Email/User Proxies: Yes Capture: Captures Username, Followers, Bits, Prime, If Prime is available, and when Prime is available. Also Sends File Output to Folder. Recommended Bots: 50-500 [HIDE][Hidden Content]]
  5. Loytec LGATE-902 versions prior to 6.4.2 suffer from cross site scripting, arbitrary file deletion, and directory traversal vulnerabilities. View the full article
  6. WordPress Form Maker plugin version 1.13.2 suffers from cross site request forgery and local file inclusion vulnerabilities. View the full article
  7. PhreeBooks ERP version 5.2.3 suffers from an arbitrary file upload vulnerability. View the full article
  8. phpFileManager version 1.7.8 suffers from a local file inclusion vulnerability. View the full article
  9. Classified Ad Lister version 2.0 suffers from an arbitrary file upload vulnerability. View the full article
  10. Thomson Reuters Concourse and Firm Central versions prior to 2.13.0097 suffer from directory traversal and local file inclusion vulnerabilities. View the full article
  11. WordPress Anti-Malware Security and Brute-Force Firewall plugin version 4.18.63 suffers from a local file inclusion vulnerability. View the full article
  12. WordPress Loco Translate plugin version 2.2.1 suffers from a local file inclusion vulnerability. View the full article
  13. This Metasploit module exploits a file upload vulnerability that allows for remote command execution in Showtime2 module versions 3.6.2 and below in CMS Made Simple (CMSMS). An authenticated user with "Use Showtime2" privilege could exploit the vulnerability. The vulnerability exists in the Showtime2 module, where the class "class.showtime2_image.php" does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG). Tested on Showtime2 3.6.2, 3.6.1, 3.6.0, 3.5.4, 3.5.3, 3.5.2, 3.5.1, 3.5.0, 3.4.5, 3.4.3, 3.4.2 on CMS Made Simple (CMSMS) 2.2.9.1. View the full article
  14. WordPress article2pdf plugin versions 0.24 and above suffer from resource exhaustion, arbitrary file download, and file deletion vulnerabilities. View the full article
  15. SPIP CMS versions 2.x and 3.x suffer from unauthenticated add administrator and arbitrary file upload vulnerabilities. View the full article
  16. Since some members on here have started creating "builders" of CVE 2018-20250 and starting to charge money from people who cant use the public CVE themself, I decided to make a quickly website which builds a malicious rar file for you. I did not want to use money on a domain for a free service nor to disclose the server IP so i configured tor and created a onion domain but upon alot of interest, i might make it clearnet and purchase a domain for it, you need either tor bundle or tor browser but tor browser is recommended if you are a network dummy. Tor Browser can be downloaded here: [Hidden Content] The service is running on this onion domain: [Hidden Content] Here can some articles be found: [Hidden Content] [Hidden Content] The RAR-file that can be downloaded contain your malicious file that you uploaded to begin with so dont extract the RAR content on your machine and if you do so then navigate to startup folder and delete the executeable file called evil.exe to remove your malware from startup. Spread the word to stop the script kiddies from charging money for public CVE's and also happy spreading.
  17. Rails version 5.2.1 suffers from an arbitrary file content disclosure vulnerability. View the full article
  18. CSZ CMS version 1.2.1 suffers from an arbitrary file upload vulnerability. View the full article
  19. 26,000,000 Combo. High Quality Gaming DB. [HIDE][Hidden Content]]
  20. CMS Made Simple Showtime2 module version 3.6.2 suffers from an authenticated arbitrary file upload vulnerability. View the full article
  21. WordPress GraceMedia Media Player plugin version 1.0 suffers from a local file inclusion vulnerability. View the full article
  22. The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. View the full article
  23. WordPress WP Fastest Cache plugin versions 0.8.9.0 and below suffer from an arbitrary file deletion vulnerability. View the full article
  24. DotNetNuke SaveAsPDF module version 1.0 suffers from an arbitrary file download vulnerability. View the full article
  25. electrify

    Top File Hosting Services for 2019

    Mediafire - [Hidden Content] Openload - [Hidden Content] DepositFiles - [Hidden Content] Mega.nz - [Hidden Content] RGhost [RECOMENDED] - [Hidden Content] Nitroflare - [Hidden Content] Gett - [Hidden Content] 1fichier - [Hidden Content] 2Shared - [Hidden Content] 4DownFiles - [Hidden Content] 4Shared - [Hidden Content] AnonFiles - [Hidden Content] Bitster - [Hidden Content] BRupload - [Hidden Content] ClickNupload - [Hidden Content] Cloudlocker - [Hidden Content] Cloud Share - [Hidden Content] Data - [Hidden Content] Data FileHost - [Hidden Content] Free.fr - [Hidden Content] DosYa - [Hidden Content] Easybytez - [Hidden Content] eDisk - [Hidden Content] EuroShare - [Hidden Content] FileRIO - [Hidden Content] Uloz - [Hidden Content]