header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Webchat Remote File Include Vulnerability

Webchat is prone to an issue that may allow remote attackers to include files located on attacker-controlled servers. This vulnerability is as a result of insufficient sanitization performed on remote user-supplied data. Under some circumstances, it is possible for remote attackers to influence the path for certain include files to point to an external file by manipulating URI parameters. If the remote file is a malicious file, this may be exploited to execute arbitrary system commands in the context of the web server.

GTCatalog Remote File Inclusion Vulnerability

GTCatalog is prone to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied data. An attacker can manipulate URI parameters to include external files on remote servers. If the remote file is a malicious file, this may be exploited to execute arbitrary system commands in the context of the web server.

File Retrieval Vulnerability

A file retrieval vulnerability has been reported for QuickTime/Darwin Streaming Server. The vulnerability exists due to insufficient sanitization of some parameters given to the parse_xml.cgi script. Information obtained in this manner may be used by an attacker to launch more organized attacks against a vulnerable system.

Command Injection Vulnerability in Axis Video Server

It has been reported that the Axis Video Servers do not properly handle input to the 'command.cgi' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which can result in a denial of service, or potentially command execution.

TYPO3 Remote File Include Vulnerability

TYPO3 is prone to an issue that may allow remote attackers to include files located on attacker-controlled servers. This vulnerability is as a result of insufficient sanitization performed on remote user-supplied data. Under some circumstances, it is possible for remote attackers to influence the path for an include file to point to an external file by manipulating URI parameters. If the remote file is a malicious file, this may be exploited to execute arbitrary system commands in the context of the web server.

TYPO3 Remote File Enumeration Vulnerability

TYPO3 is prone to a vulnerability that will allow remote attackers to enumerate whether or not files exist on the system hosting the software. This issue exists in the 'showpic.php' and 'thumbs.php' scripts. This type of information may be useful in mounting further attacks against the host system.

Invision Board Remote File Include Vulnerability

Invision Board is prone to an issue that may allow remote attackers to include files located on attacker-controlled servers. This vulnerability is as a result of insufficient sanitization performed on remote user supplied data used in URI parameters of certain PHP pages. Under some circumstances, it may be possible for remote attackers to influence the include path for a global configuration file to point to an external file on a remote server. If the remote file is a malicious file, this vulnerability may be exploited to execute arbitrary system commands in the context of the web server.

Recent Exploits: