• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

7.x

  1. 1

    Exploits PHP 7.x disable_functions Bypass

    PHP versions 7.1 up to 7.3 suffer from a disable_functions bypass vulnerability. View the full article
  2. 1

    Exploits Ahsay Backup 7.x / 8.x XML Injection

    Ahsay Backup versions 7.x through 8.1.1.50 suffer from an XML external entity injection vulnerability. View the full article
  3. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be...
  4. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be...
  5. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    Ahsay Backup versions 7.x through 8.1.1.50 suffer from authenticated arbitrary file upload and remote code execution vulnerabilities. View the full article
  6. 1

    Exploits Sahi Pro 7.x / 8.x Directory Traversal

    Sahi Pro versions 7.x and 8.x suffer from a directory traversal vulnerability. View the full article
  7. 1

    Exploits Tor Browser 7.x NoScript Bypass

    Tor Browser version 7.x suffers from a NoScript bypass vulnerability. View the full article
  8. 1

    Exploits OpenSSH 7.x Username Enumeration

    OpenSSH versions 2.3 up to 7.4 suffer from a username enumeration vulnerability. View the full article
Back
Top