الـرئـيـسـيـة
رخصة اسلام
مـن نـØـن ØŸ
خـدمـاتـنـا
إنـظـم الـيـنـا
راسـلـنـا
Support
[
is
|
sec Organization
]
[is
|
sec]
.Org
Exploit
Full Name
*
First Name
Last Name
E-mail
*
Phone Number
*
-
Area Code
Phone Number
Site involved url
*
Site admin e-mail
Infection type
*
01-known vulnerability (i.e. unpatched system)
02-undisclosed (new) vulnerability
03-configuration / admin. mistake
04-brute force attack
05-social engineering
06-Web Server intrusion
07-Web Server external module intrusion
08-Mail Server intrusion
09-FTP Server intrusion
10-SSH Server intrusion
11-Telnet Server intrusion
12-RPC Server intrusion
13-Shares misconfiguration
14-Other Server intrusion
15-SQL Injection
16-URL Poisoning
17-File Inclusion
18-Other Web Application bug
19-Remote administrative panel access through bruteforcing
20-Remote administrative panel access through password guessing
21-Remote administrative panel access through social engineering
22-Attack against the administrator/user (password stealing/sniffing)
23-Access credentials through Man In the Middle attack
24-Remote service password guessing
25-Remote service password bruteforce
26-Rerouting after attacking the Firewall
27-Rerouting after attacking the Router
28-DNS attack through social engineering
29-DNS attack through cache poisoning
30-Not available
31-Cross-Site Scripting
Infection level
*
Low
Medium
High
Exploit
*
Exploit patch
*
Attach a file
Enter the message as it's shown
*
Soumettre
Should be Empty: