Search the Community

Showing results for tags 'user'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 32 results

  1. User Profile Notes Add notes on your members’ profile pages on a separate tab that only users with the appropriate permissions set can see. Features Add notes to user profiles Edit your own notes or ones added by other moderators based on permissions Delete your own notes or ones added by other moderators based on permissions [Hidden Content] [HIDE][Hidden Content]]
  2. Infosysta Jira version 1.6.13_J8 suffers from a user name disclosure vulnerability. View the full article
  3. A remotely exploitable vulnerability exists in the 2.3.23-119-GA version of Sangoma SBC that would allow an unauthenticated user to create a privileged user on the system using the web application login interface. View the full article
  4. INFORMATION: This is a simple addon, does a very interesting task. Activate this addon,it will add fake users and guests online status to your forum so it will appear busy. Invalid, banned and invisible users will not be included by default at the fake users list. FEATURES: Fake online specific user. Fake random user in a specific user group. Fake random user activity. Set guest online count. Can select Fake activiy action . [Hidden Content] [HIDE][Hidden Content]]
  5. CentOS Control Web Panel (CWP) version 0.9.8.848 suffers from a user enumeration vulnerability. View the full article
  6. CentOS Control Web Panel (CWP) versions 0.9.8.836 through 0.9.8.840 suffer from a user enumeration vulnerability. View the full article
  7. An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86. View the full article
  8. CentOS Control Web Panel version 0.9.8.838 suffers from a user enumeration vulnerability. View the full article
  9. Steam User Pass Super Fast Combo : UserPass Proxies : Yes Bots : 80-100 Capture : Yes Games Wallet Balance Verification .loliX [HIDE][Hidden Content]]
  10. MailCarrier version 2.51 POP3 USER command remote buffer overflow exploit. View the full article
  11. ManageEngine ServiceDesk Plus version 9.3 suffers from a user enumeration vulnerability. View the full article
  12. Zeuscart version 3.0 appears to suffer from a user detail information disclosure vulnerability. View the full article
  13. Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads. For now it only supports windows/meterpreter & android/meterpreter Getting Started Please follow these instructions to get a copy of Kage running on your local machine without any problems. Prerequisites Metasploit-framework must be installed and in your PATH: Msfrpcd Msfvenom Msfdb Video Tutorial [HIDE][Hidden Content]]
  14. vBulletin version 4.2.5 with Advanced User Tagging version 3.1.3 suffers from an open redirection vulnerability. View the full article
  15. WordPress WP User Manager plugin version 2.0.8 suffers from a remote shell upload vulnerability. View the full article
  16. CUJO Firewall suffered from authorization bypass, denial of service, and user enumeration vulnerabilities. View the full article
  17. Info: [Hidden Content] [Hidden Content] [HIDE][Hidden Content]] Pass: level23hacktools.com About This File Enhance your user info panel with this powerful fully customizable plugin for the forum topic posts, You do not need to show all the information you can choose to show or hide any one of them or just choose to hide them on mobile viewing, you can now even choose what user groups can see what information User Info Panel Edit the width of the user info panel between 200px - 350px Move the username to the user info panel Set a margin from the top of the post panel (Needed on some themes you won't need for the default theme) Change the font of the username (you can use web safe fonts, Google fonts or you can even upload your own!!!!!) Change the width & height of the avatar between 75px - 200px Choose to have a border-radius around the avatar and enter your own amount Show/Hide the users cover photo (If they have one) Change the height of the users cover photo Show/Hide a topic starter badge or field to the info panel (If the user is the topic starter) Move the users rank pips / rank image to below the info panel Profile Info Show/Hide the users group with colour formatting Show/Hide secondary group images Show/Hide the users rank / title Move the users rank / title to below the avatar / below the username or in the user info panel Show/Hide the users clubs as icons (if they are members of one) Show/Hide the users ID Content Show/Hide the users post count Show/Hide the users post per day ratio Show/Hide the users reputation Show/Hide the users amount of leader board member of the days won Choose to use a gold font for the member of the day Show/Hide the users topic count Show/Hide the users topic per day ratio Personal Info Show/Hide the users birthday Change the birthday view to the show the members age instead Show/Hide the users joined date Change the joined date to one saying "With Us For xxx Days" Show/Hide the users online status Change the online status to a pip Choose to use a pulsating green glow for when the users online Show/Hide the users last activity Show/Hide the users timezone Show/Hide the users follower count Show/Hide the users connected device (4.2.x Only) Clubs Show/Hide the users clubs as icons at the bottom of the user info panel (The club name will appear on hover) Change the size of the clubs icons 3rd Party Apps & Plugins (DF42) Members Social Info iAwards Member Away Trophys & Medals ( RECOMMENDED ) Members Shop Other Choose what font-awesome icons are used for each section from a pre-defined list of over 600 icons (Just start typing the name and they will appear) Show/Hide each section for mobile browsing Select what user groups can see what on the info panel Add any of your custom profile fields to the user info panel matching its theme and style
  18. WordPress User Registration plugin version 1.5.3 suffers from a cross site scripting vulnerability. View the full article
  19. Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to extracting local and ldap users. View the full article
  20. 1337day-Exploits

    OpenSSH User Enumeration

    OpenSSH versions prior to 7.7 suffer from a user enumeration vulnerability. View the full article
  21. Zimbra Collaboration User Enumeration Script (CVE-2018-10949) How to use The argument --host must be the hostname or IP address of Zimbra Collaboration Web Application root page, and --userlist an list of usernames to check against it. [email protected]# ./cve-2018-10949-user-enum.py --host [Hidden Content] --userlist /tmp/emails.txt And it should spill out valid e-mails! [Hidden Content]
  22. CVE-2018-15473-Exploit Exploit written in Python for CVE-2018-15473 with threading and export formats Threading - default 5 If more than 10 are used, often the OpenSSH service gets overwhelmed and causes retries Single username evaluation via username parameter Multiple username evaluation via userList parameter Multiple username evaluation file output via outputFile parameter Multiple output formats (list, json, csv) via outputFormat parameter An example username input file is given in exampleInput.txt An example results output file in List format is given in exampleOutput.txt An example results output file in JSON format is given in exampleOutput.json An example results output file in CSV format is given in exampleOutput.csv Build the image: docker build -t cve-2018-15473 . Run the exploit: docker run cve-2018-15473 -h Delete containers and image: docker ps -a | awk '$2 == "cve-2018-15473" {print $1}' | xargs docker rm docker rmi cve-2018-15473 [Hidden Content]
  23. An impersonation issue in BMC Remedy version 7.1 may lead to incorrect user context in Remedy AR System Server. View the full article
  24. This Metasploit module exploits a vulnerability in Linux kernels 4.15.0 to 4.18.18, and 4.19.0 to 4.19.1, where broken uid/gid mappings between nested user namespaces and kernel uid/gid mappings allow elevation to root (CVE-2018-18955). The target system must have unprivileged user namespaces enabled and the newuidmap and newgidmap helpers installed (from uidmap package). This Metasploit module has been tested successfully on: Fedora Workstation 28 kernel 4.16.3-301.fc28.x86_64; Kubuntu 18.04 LTS kernel 4.15.0-20-generic (x86_64); Linux Mint 19 kernel 4.15.0-20-generic (x86_64); Ubuntu Linux 18.04.1 LTS kernel 4.15.0-20-generic (x86_64). View the full article
  25. Intel Rapid Storage Technology User Interface and Driver version 15.9.0.1015 suffers from a dll hijacking vulnerability. View the full article