A vulnerability exists in AEDating (all versions) which allows a remote attacker to include a file from a remote host. The vulnerability is due to the application including files based on user-supplied input without proper validation. An attacker can exploit this vulnerability to include arbitrary files from remote hosts, which can lead to the execution of arbitrary code on the vulnerable system. This can be exploited by sending a specially crafted HTTP request containing directory traversal sequences and a URL to a malicious host.
SQL injection in score.php and quiz_id var in home.php are not proprely verified and can be used to inject query. Arbitary File Upload vulnerable code in back/upload_img.php and admin/upload_img.php near lines 74-76. $upload , $ok_update , $image , $path variables are not sanitized and can be used to upload files. cfgphpquiz/install.php is accessible without authentification, the script is used to save configuration setting in config.inc.php.
A vulnerability exists in Coppermine Photo Gallery v1.2.2b for PHPNUKE, which allows a remote attacker to include a file from a remote location. This is due to the application not properly sanitizing user-supplied input to the 'THEME_DIR' parameter in the 'themes.php' script. An attacker can exploit this vulnerability to include arbitrary files from remote locations, which can lead to the execution of arbitrary code on the vulnerable system.
Remote File Inclusion: vulnerable code in starnet/modules/sn_allbum/slideshow.php near line 39 - 46 and line 91. $cmsdir is not properly verified, can be used to include files from remote resources which would allow a remote attacker to execute arbitrary command with the privilege of the webserver. Directory Traversal: PoC: http://localhost/starnet/editors/htmlarea/popups/images.php?dir=../../ Arbitary File Upload: PoC: http://localhost/starnet/editors/htmlarea/popups/upload.php
BolinOS v.4.5.5 is vulnerable to a remote file include vulnerability due to a lack of sanitization of user-supplied input to the 'gBRootPath' parameter of the 'gBIndex.php' script. An attacker can exploit this vulnerability by sending a malicious URL to an unsuspecting user. The malicious URL contains a specially crafted string that, when processed by the vulnerable script, will cause arbitrary remote code execution.
Haberx v1.1 (tr) is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the admin credentials by sending a specially crafted HTTP request to the vulnerable application. The vulnerable parameter is 'id' in 'kategorihaberx.asp' page. An attacker can send a malicious payload to the vulnerable parameter to gain access to the admin credentials.
PhotoPost 4.6 & 4.5 & 4.x.....4.0 is vulnerable to a remote file inclusion vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'PP_PATH' parameter of the 'zipndownload.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system. The vulnerable code is located in the 'zipndownload.php' script, which includes the 'require' statement with the 'PP_PATH' parameter.
A remote file inclusion vulnerability exists in TeamCal Pro 2.8.001, due to insufficient sanitization of user-supplied input to the 'app_root' parameter of the 'footer.html.inc.php' script. An attacker can exploit this vulnerability to include arbitrary remote files, leading to arbitrary remote code execution.
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mosConfig_absolute_path' parameter in the 'install.serverstat.php' script. This can be exploited to include arbitrary files from remote hosts.
Input passed to the "pagename" is not properly verified before being used to include files. This can be exploited to execute arbitrary PHP code by including files from local or external resources.