The Sinapis Forum 2.2 script is vulnerable to Remote File Inclusion (RFI) attack. An attacker can exploit this vulnerability by injecting a malicious file path in the 'fuss' parameter of the sinapis.php file, which can lead to arbitrary code execution on the server.
The Sinapis 2.2 Gastebuch script is vulnerable to Remote File Inclusion (RFI) attack. The vulnerability allows an attacker to include a remote file hosted on a malicious server, which can lead to remote code execution or other malicious activities.
The FCRing 1.3 Webringskript has a vulnerability that allows remote attackers to include arbitrary files via the 's_fuss' parameter in fcring.php.
The DBImageGallery 1.2.2 script is vulnerable to remote file inclusion (RFI) attacks. By manipulating the 'donsimg_base_path' parameter in various PHP files, an attacker can include and execute arbitrary remote files, potentially leading to remote code execution.
The Mangobery 0.5.5 script is vulnerable to Remote File Inclusion (RFI) attacks in the 'boxes/quotes.php' and 'templates/mangobery/footer.sample.php' files. An attacker can exploit this vulnerability by including a malicious file from a remote server using the 'Site_Path' parameter, leading to arbitrary code execution.
The vulnerability allows an attacker to include a remote file in the system's ImageImageMagick.php file. By manipulating the 'glConf[path_system]' parameter, an attacker can specify a malicious file hosted on a remote server to be executed on the target system.
The vulnerability allows an attacker to include remote files by manipulating the 'absolute_path' parameter in various PHP files. This can lead to unauthorized access, remote code execution, and potential compromise of the affected system.
The Pathos Content Management System is vulnerable to a remote file inclusion (RFI) vulnerability in the 'warn.php' file. The vulnerability allows an attacker to include arbitrary remote files by manipulating the 'file' parameter in the URL.
This exploit allows an attacker to include remote files on the vulnerable server, leading to potential code execution.
This exploit allows an attacker to include remote files on a vulnerable web application using the modifyform.html?code= parameter. By manipulating the code parameter, an attacker can execute arbitrary code or disclose sensitive information from remote servers.