header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

n@board v3.1.9e, 3.1.8cgb ,3.1.8tc skin Remote File Include Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This request contains a maliciously crafted URL in the 'skin' parameter which can be used to include a malicious file from a remote server.

PHPLibrary <= 1.5.3 Remote File Inclusion

PHPLibrary version 1.5.3 is vulnerable to a Remote File Inclusion vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains a malicious file which is then included and executed by the vulnerable application.

claroline <= 180rc1 Remote File Inclusion

Claroline is vulnerable to a remote file inclusion vulnerability due to a lack of proper sanitization of user-supplied input to the 'includePath' parameter of the 'import.lib.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system.

ECHO_ADV_54$2006

Input passed to the "$calpath" parameter in update.php is not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or externa resources.

7 php scripts File Inclusion Vuln / Source disclosure

A vulnerability in Album Photo Sans Nom v1.6 allows an attacker to include arbitrary files via the 'img' parameter in the 'getimg.php' script. This can be exploited to disclose the source code of the vulnerable script by passing the path to the 'config.inc.php' file.

Flatnuke 2.5.8 ‘userlang’ arbitrary local inclusion/delete all users exploit

Flatnuke 2.5.8 is vulnerable to an arbitrary local inclusion/delete all users exploit. This exploit allows an attacker to delete all users from the Flatnuke 2.5.8 application. The exploit works regardless of php.ini settings.

docmint <= 2.0 (MY_ENV[BASE_ENGINE_LOC]) Remote File Inclusion Exploit

docmint <= 2.0 is vulnerable to a remote file inclusion vulnerability. This vulnerability allows an attacker to include a remote file, usually through a maliciously constructed URL. This can allow an attacker to execute arbitrary code on the server.

Recent Exploits: