WM-News v0.5 is vulnerable to Remote File Include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, containing arbitrary code. This can result in arbitrary code execution on the vulnerable server.
News Evolution v3.0.3 is vulnerable to Remote File Include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute it on the vulnerable server. This can be exploited to execute arbitrary PHP code on the vulnerable server.
ACGV News v0.9.1 is vulnerable to a Remote File Include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute it on the vulnerable server. This can lead to the attacker gaining access to sensitive information, such as passwords, or even full control of the server.
A vulnerability in PhpNews v1.0 allows remote attackers to execute arbitrary code by including a malicious file via a URL in the Include parameter of the lib.inc.php3 or variables.php3 script.
This exploit discloses some file contempt, php source code, etc. from the target server.
There is a vulnerability within the Redirect.bat file on a ibm director cgi which allows a directory transversal to take place which in turn exposes most files on the system to be read without authorization.
Fire Soft Board is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
A remote include vulnerability exists in Web Server Creator v0.1, which allows an attacker to include a remote file via the 'l' parameter in the customize.php script.
Variable $spaw_root not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.
ppalCart V(2.5 EE) is vulnerable to a Remote File Inclusion vulnerability due to the lack of proper sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL in the 'proMod' parameter of the 'index.php' and 'mainpage.php' files. This can allow the attacker to execute arbitrary code on the vulnerable system.