
Google Search Dork: inurl:server.php ext:php intext:"No SQL" Released
vulnerabilitydiscovered by Secunia, quick reference:http://www.securityfocus.com/bid/16187an example of exploit for PHPOpenChat:http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.htmla DOS exploit:http://retrogod.altervista.org/adodb_dos.html
inurl:server.php ext:php intext:"No SQL" Released Google Dork Source : inurl:server.php ext:php intext:"No SQL" Released