• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

3.2

  1. itsMe

    Starus Web Detective 3.2

    Starus Web Detective is software that helps you recover history deleted, and the analysis of many types of web browsers. The app will allow you to monitor browsing history, bookmarks, list download and password, even if user has delete this information from your browser. Starus Web Detective...
  2. itsMe

    Rohos Disk Encryption 3.2

    The Rohos Disk Encryption program creates hidden and protected partitions on a computer, USB flash drive or cloud storage. It protects/locks access to encrypted partitions with a hardware key replacing your password. When there are megabytes of sensitive files and private data on your computer...
  3. 1

    Exploits Sentrifugo 3.2 Cross Site Scripting

    Sentrifugo version 3.2 suffers from a persistent cross site scripting vulnerability. View the full article
  4. 1

    Exploits Sentrifugo 3.2 File Upload Restriction Bypass

    Sentrifugo version 3.2 suffers from a file upload restriction bypass vulnerability. View the full article
  5. 1

    Exploits Sentrifugo Human Resource Management System 3.2 File Disclosure

    Sentrifugo Human Resource Management System version 3.2 suffers from a database configuration file disclosure vulnerability. View the full article
  6. 1

    Exploits Joomla JVLE JV-LinkExchanger 3.2 SQL Injection

    Joomla JVLE JV-LinkExchanger version 3.2 suffers from a remote SQL injection vulnerability. View the full article
  7. 1

    Exploits WordPress Easy Testimonials 3.2 Cross Site Scripting

    WordPress Easy Testimonials version 3.2 suffers from a cross site scripting vulnerability. View the full article
  8. 1

    Exploits Sentrifugo HRMS 3.2 SQL Injection

    Sentrifugo HRMS version 3.2 suffers from a remote SQL injection vulnerability. View the full article
Back
Top