Site search

Search results: «bugs»

Found matches: 21

Visual Photo Viewer (AlphaVisualPhotos)
Installation: go to the control panel, open the Alpha installer, upload the archive downloaded after purchase, and install.
Replaces the standard photo viewer on the website (img_show css/js).

Features:
1. When viewing photos, views are taken into account.
2. You can scroll back and forth.
3. The current photo numbering is shown.
4. You can enlarge or reduce photos. On smartphones, you can drag your finger over the enlarged photo to see the details better.
5. You can like or dislike photos. The counters of likes, dislikes, views, and comments are shown.
6. For listing, the...
Installation: go to the control panel, open the Alpha installer, upload the archive downloaded after purchase, install.

A mobile movie module that will increase the popularity of your site.

Features:

1. The database already contains more than 2,500 films.

2. The module is reliable and works through the Kinopoisk API, does not use fake movie sites.

3. Online movie viewing is available on the website.

4. Movie download is available in the online player.

5. Our own movie rating from 0 to 100% and from 0 to 5 stars has been developed.

6. You can write comments under the films....
Installation: Go to the control panel, open the Alpha installer, upload the archive downloaded after purchase, and install.

Quick dialogs for the desktop version, with which you can reply to people via email without leaving the current page. Inspired by quick dialogs in VK.

Features:

1. Dialog button and modal window.

2. You can open the contact list in a modal window and see who sent you messages.

3. You can open a conversation with a user in a modal window and reply to them.

4. File attachments, emoticons, and BBCodes are available in the conversation.

5. Conversations are powered...
1. WEB APPLICATION HACKER’S ’s HANDBOOK
This book teaches you how to find and fix problems in websites. It shows real examples and how hackers attack web apps.

2. THE HACKER’S PLAYBOOK 2
This is like a guidebook for ethical hackers. It gives step-by-step instructions to test and break into systems (legally) for learning.

3. HACKING: THE ART OF EXPLOITATION
This book explains how hacking works inside computers. It teaches programming, how to find bugs, and how hackers use them.

4. GHOST IN THE WIRES
This is a true story about a famous hacker, Kevin Mitnick. He tells how he...
DataLife Engine is a popular content management system. It is constantly being improved by the development team, responding to all current requests. Currently, users can access the major version 19.0, which has undergone active testing and implementation. Before downloading DLE 19.0 nulled, you should carefully review all the key features of the optimized build. You can already take advantage of fast and secure features, optimize websites, and implement relevant functionality in just a few clicks.
The word filter in the panel has been updated. Data has been converted to a convenient storage format for future scalability when implementing required functionality....
Automatic location detection 1.2
Installation: Go to the control panel, open the Alpha installer, upload the archive downloaded after purchase, and install.
After registering an account, the mod will attempt to roughly determine the location based on your current IP address and offer to install it in the profile.
The mod requires support for the file_get_contents() function to communicate with the API of a specialized service that determines location by IP.

Update 09/25/2021:
The mod has been moved to the user dashboard to reduce performance impact on all pages.

Update 03/09/2023:
Improved city and country recognition.

Update 06/13/2023:
Fixed bugs.
🚨 Mistakes That Are Slowly Destroying Your PC (Stop Doing These!) 💻🔥

Your PC might look fine, but these everyday habits are silently killing its performance and lifespan. Avoid these costly mistakes before it’s too late 👇

✅ Never restarting your PC — Causes memory overload and long-term slowdowns
✅ Too many startup apps — Slows boot time and eats system resources
✅ Ignoring Windows updates — Opens doors to security threats and system crashes
✅ Running with low disk space — Windows needs free space to operate properly
✅ Not cleaning temporary files — Junk data quietly drags performance...
Script top rating site ioav. The script allows you to collect site statistics. Written in php 5.6 and uses mysql . Of all the undoubted advantages, this is that it has an adaptive beautiful design.

In the script itself, I fixed a bunch (just a big bunch) of bugs with holes. Corrected the design in some places. The script contains the source code of the counters in psd format. You will be able to change the site on the counters yourself. Also in the top works the purchase of advertising or the purchase of vip for the site. There is...
Free Forum v. 3.5 modules are compatible with all versions of the CMS engine, including the new 16.0. It's easy to install and configure, and integrates seamlessly with your website.
The package includes two installation files for Forum v. 3.5. The first is the DLE Edition forum, integrated into DLE, and the second is the full version of the forum, displayed on a separate page. Choose the one that suits your needs.
DLE Forum V.3.5 modules feature a responsive design that allows the forum to display on various devices without losing core functionality. The modules feature a stylish design based...
MobSF has Stored XSS via Manifest Analysis - Dialer Code Host Field

A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The android:host attribute from <data android:scheme="android_secret_code"> elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover.

https://github.com/advisories/GHSA-8hf7-h89p-3pqj

⚠️ WARNING: LEGAL DISCLAIMER

This tool is intended for educational purposes only. The author is not responsible for any illegal use of this tool. Users aresolely responsible for their actions.

#kalilinux #kalilinuxtools #informationsecurity #ethicalhacker #pentesting #Ubuntu...