
Google Search Dork: "Enter ip" inurl:"phpping.php"
It has been reported that php-ping may be prone to a remote command execution vulnerability that may allow remote attackers to execute commands on vulnerable systems. The problem exists due to insufficient sanitization of shellmetacharacters via the 'count' parameter of php-ping.php script.report: http://www.securityfocus.com/bid/9309/info/sample: http://img64.exs.cx/my.php?loc=img64&image=phpping.jpg
"Enter ip" inurl:"phpping.php" Google Dork Source : "Enter ip" inurl:"phpping.php"