• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

bypass

  1. 1

    Exploits XNU Copy-On-Write Behavior Bypass

    XNU suffers from a copy-on-write behavior bypass via mount of user-owned filesystem image. View the full article
  2. 1

    Exploits WordPress Cerber 8.0 Bypass

    WordPress Cerber Security, Antispam, and Malware Scan plugin version 8.0 suffers from multiple bypass vulnerabilities. View the full article
  3. 1

    Exploits SHAREit For Android 4.0.38 Authentication Bypass / File Download

    DUMPit is an exploit for the SHAREit mobile app abusing two recently discovered vulnerabilities affecting SHAREit Android application versions 4.0.38 and below. The first one allows an attacker to bypass SHAREit device authentication mechanism, and the other one enables the authenticated...
  4. 1

    Exploits MikroTik RouterOS Firewall / NAT Bypass

    MikroTik RouterOS versions prior to 6.43.12 (stable) and 6.42.12 (long-term) firewall and NAT bypass exploit. View the full article
  5. 1

    Exploits WordPress WooCommerce GloBee Payment Gateway 1.1.1 Bypass / Spoofing

    WordPress WooCommerce plugin with GloBee cryptocurrency payment gateway versions 1.1.1 and below suffer from payment bypass and unauthorized order status spoofing vulnerabilities. View the full article
  6. 1

    Exploits RVSiteBuilder RVGlobalSoft CMS 7.0 Bypass / Disclosure / SQL Injection

    RVSiteBuilder RVGlobalSoft CMS version 7.0 suffers from bypass, database disclosure, file download, path disclosure, remote file upload, and remote SQL injection vulnerabilities. View the full article
  7. 1

    Exploits BizPotential EasyWebTime 8.6.2 Bypass / SQL Injection

    BizPotential EasyWebTime version 8.6.2 suffers from bypass and remote SQL injection vulnerabilities. View the full article
  8. 1

    Exploits Joomla Agora 4.10 Bypass / SQL Injection

    Joomla Agora version 4.10 suffers from bypass and remote SQL injection vulnerabilities. View the full article
  9. 1

    Exploits Coship Wireless Router 4.0.0.x / 5.0.0.x Authentication Bypass

    Coship Wireless Router versions 4.0.0.x and 5.0.0.x suffer from an unauthenticated password reset vulnerability. View the full article
  10. 1

    Exploits OSCI-Transport Library 1.2 1.8.1 Insecure Crypto / Signature Bypass

    OSCI-Transport Library 1.2 for German e-Government versions 1.8.1 and below suffer from an insecure cryptographic implementation and signature bypass vulnerabilities. View the full article
  11. 1

    Exploits CUJO Firewall User Enumeration / Authorization Bypass

    CUJO Firewall suffered from authorization bypass, denial of service, and user enumeration vulnerabilities. View the full article
  12. 1

    Exploits Joomla HWDVideoShare 1.5 Bypass / Database Disclosure / SQL Injection

    Joomla HWDVideoShare component version 1.5 suffers from bypass, database disclosure, and remote SQL injection vulnerabilities. View the full article
Back
Top