phpMyConferences is vulnerable to a remote file inclusion vulnerability. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'lvc_include_dir' parameter in the 'menus.inc.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by including a malicious file from a remote location.
This exploit allows an attacker to execute arbitrary code on a vulnerable system by exploiting a Remote Code Inclusion vulnerability in Redaction System 1.0000. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'lang_prefix' parameter of the 'conn.php', 'index.php', 'sesscheck.php', 'wap/conn.php' and 'wap/sesscheck.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable system. Successful exploitation of this vulnerability can result in arbitrary code execution on the vulnerable system.
SpamBlockerMod package for phpBB is vulnerable to a remote file include vulnerability. This vulnerability allows an attacker to execute arbitrary code on the vulnerable server by sending a maliciously crafted HTTP request.
A vulnerability in phpBB Ajax Shoutbox <= 0.0.5 allows remote attackers to include arbitrary files via the phpbb_root_path parameter in a URL. The vulnerable code is located in the shoutbox.php file, where the phpbb_root_path parameter is not properly sanitized before being used in a require_once() statement. This can be exploited to include arbitrary files from local or external resources.
An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This can allow the attacker to include a remote file containing arbitrary code, resulting in a compromise of the web server.
A buffer overflow vulnerability exists in BulletProof FTP (Client) V2.45. The vulnerability is caused due to a boundary error within the handling of FTP requests. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted string to the affected server. Successful exploitation allows execution of arbitrary code.
A vulnerability in afgb GUESTBOOK V2.2 allows remote attackers to include arbitrary files via a URL in the Htmls parameter to unspecified scripts.
Variable $pathToFiles not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.
A remote file include vulnerability exists in PHPht Topsites, due to insufficient sanitization of user-supplied input to the 'phpht_real_path' parameter of the 'common.php' script. An attacker can exploit this vulnerability to include arbitrary remote files, allowing for the execution of arbitrary PHP code.
A remote file include vulnerability exists in PHPBB insert user 0.1.2. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. This can be exploited by sending a specially crafted HTTP request containing a malicious URL to the vulnerable script.