header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ay System Solutions CMS <= v2.6 (main.php) Remote File Inclusion Exploit

A vulnerability exists in Ay System Solutions CMS version 2.6 and prior. The vulnerability is due to the 'manage/template/standard/main.php' script not properly sanitizing user-supplied input to the 'path[ShowProcessHandle]' parameter. This can be exploited to include arbitrary files from remote hosts by passing a URL in this parameter. Successful exploitation requires that 'allow_url_include' is set to 'On' in the 'php.ini' file.

iziContents <= RC6 GLOBALS[] Remote Code Execution Exploit

iziContents is vulnerable to Remote Code Execution due to the use of the GLOBALS[] array in the include/rssfunctions.php file. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which will allow the attacker to execute arbitrary code on the server.

CliServ Web Community <= 0.65 (cl_headers) Remote File Include Vulnerability

CliServ Web Community version 0.65 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Integramod Portal 2.x File Inclusion Vulnerabilities

Integramod Portal 2.x is vulnerable to File Inclusion Vulnerabilities. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious code in the 'phpbb_root_path' parameter. This malicious code will be executed on the vulnerable server.

Recent Exploits: