![]() |
SQL exploiters
Hey guys!
Im sure many of you are already aware of an sql exploit that allows people to use your email submission scripts to send spam to people. I was looking through my search engine logs and I found the following, Code:
1.0 42c706e7 7bit hahahahahahahahahahahahahahahahahahahahahahahahahahahaha=0689431323hahahaha bcc boundary= charset content-transfer-encoding content-type format. from [email protected] [email protected] message mime mime-version multi-part multipart/mixed qly subject text/plain us-ascii Just to give you the heads up, as Im sure most of you have protection already in place, Im sure some poor shlubs don't... You can learn more about this exploit by typing "[email protected]" In google. Later. |
pm me.....
|
All times are GMT -7. The time now is 01:43 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc