header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

K_fileManager v1.2 <= (dwl_include_path) Remote File Inclusion Exploit

K_fileManager v1.2 is vulnerable to a Remote File Inclusion vulnerability due to a lack of sanitization of user-supplied input in the 'dwl_include_path' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a malicious URL in the 'dwl_include_path' parameter, which will be included in the application. This can allow an attacker to execute arbitrary code on the vulnerable system.

Voodoo chat 1.0RC1b <= (file_path) Remote File Inclusion Exploit

Voodoo chat 1.0RC1b is vulnerable to a remote file inclusion vulnerability due to a failure to properly sanitize user-supplied input to the 'file_path' parameter in the 'index.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by sending a malicious URL to a legitimate user of the application.

WoW Roster <= 1.5.1 Remote File Include Vulnerabilities

A vulnerability exists in World of Warcraft (WoW) Roster, which allows a remote attacker to include a file from a remote host that is outside of the intended system's path. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. The vulnerability is due to insufficient sanitization of user-supplied input to the 'subdir' parameter in the 'conf.php' script.

NewsLetter v3.5 <= (NL_PATH) Remote File Inclusion Exploit

A vulnerability exists in NewsLetter v3.5, which allows a remote attacker to include a file from a remote host. This is due to a failure in the application to properly sanitize user-supplied input to the 'NL_PATH' parameter in 'index.php'. An attacker can exploit this vulnerability to include arbitrary files from remote hosts, which can lead to the execution of arbitrary code on the vulnerable system.

Recent Exploits: