by callaars on 3/31/16, 5:39 PM with 15 comments
by Bognar on 3/31/16, 5:58 PM
by kbenson on 3/31/16, 6:06 PM
Still, kind of scary to see. It's like a listening netcat piping to bash in a loop. Sure there should be a firewall in front...
by chc on 3/31/16, 6:13 PM
by throwaway2016a on 3/31/16, 6:04 PM
https://github.com/search?utf8=%E2%9C%93&q=include%28%24_GET...
There is a simple Google search that allows you to find thousands of websites that do this. Which I won't put since it essential gives you a list of websites ripe for take over.
by blakesterz on 3/31/16, 6:14 PM
by goshx on 3/31/16, 6:02 PM
by ams6110 on 3/31/16, 6:13 PM
SQL.exec($_GET['sql'])
Was used for support to be able to access customer data to be able to reproduce bugs, etc.by asfakeaccount on 3/31/16, 6:08 PM