• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

software

  1. 1

    Exploits Plexo Torresoft Alex Torres Software 2.0 Cross Site Scripting / SQL Injection

    Plexo Torresoft Alex Torres Software version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  2. 1

    Exploits 1CRM On-Premise Software 8.5.7 Cross Site Scripting

    1CRM On-Premise Software version 8.5.7 suffers from a persistent cross site scripting vulnerability. View the full article
  3. 1

    Exploits Koha Library Software 18.1106000 Open Redirection

    Koha Library Software version 18.1106000 suffers from an open redirection vulnerability. View the full article
  4. 1

    Exploits DNSS Domain Name Search Software 2.1.8 Denial Of Service

    DNSS Domain Name Search Software version 2.1.8 denial of service proof of concept exploit. View the full article
  5. 1

    Exploits Blue Angel Software Suite Command Execution

    Blue Angel Software Suite suffers from a command execution vulnerability. View the full article
  6. S

    How to format combo lists for cracking software

    Hello and thank you for your time and consideration into my inquiry. I am using EZCrack V1.7 multi-purpose cracking tool and I have a considerable list of credentials and mass-sourced E-mail addresses but I am unsure as to A. what type of file extension i should be saving the combolist as, and...
  7. 1

    Exploits RingsDB Software 1.0.0 Database Disclosure

    RingsDB Software version 1.0.0 suffers from a database disclosure vulnerability. View the full article
  8. 1

    Exploits ChurchCRM Software 3.3.2 Database Disclosure

    ChurchCRM Software version 3.3.2 suffers from a database disclosure vulnerability. View the full article
  9. 1

    Exploits OrangeScrum Project Management Software 1.6.1 Database Disclosure

    OrangeScrum Project Management Software version 1.6.1 suffers from a database disclosure vulnerability. View the full article
  10. 1

    Exploits Ashop Shopping Cart Software SQL Injection

    Ashop Shopping Cart Software suffers from a remote SQL injection vulnerability in bannedcustomers.php. View the full article
  11. 1

    Exploits Ashop Shopping Cart Software SQL Injection

    Ashop Shopping Cart Software suffers from a remote SQL injection vulnerability. View the full article
  12. 1

    Exploits Shinobi Security Software 1.0 Database Disclosure

    Shinobi Security Software version 1.0 suffers from a database disclosure vulnerability. View the full article
  13. dEEpEst

    Reverse Engineering Ghidra software reverse engineering of the NSA

    Hidden content
  14. 1

    Exploits Zarr Software Warwickshire 1.x Open Redirection

    Zarr Software Warwickshire version 1.x suffers from an open redirection vulnerability. View the full article
  15. 1

    Exploits Social Bookmarking Software 1.2.3 Local File Inclusion

    Social Bookmarking Software version 1.2.3 suffers from a local file inclusion vulnerability. View the full article
  16. 1

    Exploits Faleemi Desktop Software 1.8 Local Buffer Overflow

    Faleemi Desktop Software version 1.8 local SEH buffer overflow exploit with DEP bypass. View the full article
  17. itsMe

    XF2 xenforo v2.0.12 Forum Software (nulled)

    A compelling community experience. Intuitive. Social. Engaging. Fast. XenForo brings a fresh outlook to forum software. Hidden content
  18. dEEpEst

    Cracking Uplay SoftWare By Hangover [1.1.2.0]

    Download: Hidden content Password: level23hacktools.com
  19. 1

    Exploits Mumsoft Easy Software 2.0 Denial Of Service

    Mumsoft Easy Software version 2.0 suffers from a denial of service vulnerability. View the full article
  20. 1

    Exploits ServersCheck Monitoring Software 14.3.3 SQL Injection

    ServersCheck Monitoring Software versions up through 14.3.3 suffer from a remote SQL injection vulnerability. View the full article
Back
Top