
Google Search Dork: inurl:tmssql.php ext:php mssql pear adodb cvs akbk
dork:inurl:tmssql.php ext:php mssql pear adodb -cvs -akbka remote user can execute an arbitrary function (without arguments) example: http://[target]/[path]/tmssql.php?do=phpinfo reference:http://www.osvdb.org/displayvuln.php?osvdb_id=22291 I also discovered that you can crash some win boxes / apache servers by sendingmultiple requests of http://[target]/[path]/tmssql.php?do=closelogsee:http://www.milw0rm.com/exploits/1651
inurl:tmssql.php ext:php mssql pear adodb cvs akbk Google Dork Source : inurl:tmssql.php ext:php mssql pear adodb cvs akbk