• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

file

  1. 1

    Exploits Microsoft Windows 10 AppXSvc Deployment Service Arbitrary File Deletion

    Microsoft Windows 10 AppXSvc Deployment Service suffers from an arbitrary file deletion vulnerability. View the full article
  2. 1

    Exploits Joomla JS Support Ticket 1.1.6 Arbitrary File Deletion

    Joomla JS Support Ticket component version 1.1.6 suffers from an arbitrary file deletion vulnerability in ticket.php. View the full article
  3. 1

    Exploits osTicket 1.12 File Upload Cross Site Scripting

    An issue was discovered in osTicket versions before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is...
  4. 1

    Exploits Joomla JS Support Ticket 1.1.5 Arbitrary File Download

    Joomla JS Support Ticket component version 1.1.5 suffers from an arbitrary file download vulnerability. View the full article
  5. 1

    Exploits Aptana Jaxer 1.0.3.4547 Local File Inclusion

    Aptana Jaxer version 1.0.3.4547 suffers from a local file inclusion vulnerability. View the full article
  6. 1

    Exploits ATutor 2.2.4 Arbitrary File Upload / Command Execution

    ATutor version 2.2.4 suffers from a language_import arbitrary file upload that allows for command execution. View the full article
  7. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be...
  8. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    This Metasploit module exploits an authenticated insecure file upload and code execution flaw in Ahsay Backup versions 7.x through 8.1.1.50. To successfully execute the upload credentials are needed, default on Ahsay Backup trial accounts are enabled so an account can be created. It can be...
  9. 1

    Exploits Ahsay Backup 7.x / 8.x File Upload / Remote Code Execution

    Ahsay Backup versions 7.x through 8.1.1.50 suffer from authenticated arbitrary file upload and remote code execution vulnerabilities. View the full article
  10. dEEpEst

    Wordpress Site Hacking By Config php File

    Hidden content
  11. 1

    Exploits Microsoft Compiled HTML Help / Uncompiled .chm File XML External Entity Injection

    Microsoft compiled HTML Help and uncompiled .chm files can be leveraged for XML external entity injection attacks. View the full article
  12. 1

    Exploits FlightPath Local File Inclusion

    FlightPath versions prior to 4.8.2 and 5.0-rc2 suffer from a local file inclusion vulnerability. View the full article
  13. 1

    Exploits Karenderia CMS 5.1 Local File Inclusion

    Karenderia CMS version 5.1 suffers from a local file inclusion vulnerability. View the full article
  14. 1

    Exploits Microsoft File Checksum Verifier 2.05 DLL Hijacking

    Microsoft File Checksum Verifier version 2.05 suffers from a dll hijacking vulnerability. View the full article
  15. itsMe

    Reverse Engineering Lst2X64Dbg - Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database

    This script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg database is created in the current directory based on the extracted labels. The LST file can be generated in IDA from the File menu: Produce file -> Create LST file... Hidden...
  16. itsMe

    ONESERVERS.SU | ZOROTEX.ORG - DB File Dumped

    ONESERVERS.SU Hidden content ZOROTEX.ORG SQL Hidden content
  17. itsMe

    Cracking File Upload Checker + Capture Balance

    Hidden content
  18. 1

    Exploits Microsoft Windows CmpAddRemoveContainerToCLFSLog Arbitrary File / Directory Creation

    Microsoft Windows suffers from a CmpAddRemoveContainerToCLFSLog arbitrary file and directory creation vulnerability that allows for elevation of privilege. View the full article
  19. 1

    Exploits GrandNode 4.40 Path Traversal / File Download

    GrandNode versions 4.40 and below suffer from arbitrary file download and path traversal vulnerabilities. View the full article
  20. 1

    Exploits Microsoft Word (2016) Deceptive File Reference

    When a Microsoft Word ".docx" File contains a hyperlink to another file, it will run the first file it finds in that directory with a valid extension. But will present to the end user an extension-less file in its Security warning dialog box without showing the extension type. If another "empty"...
Back
Top