The FdWeB Espace Membre <= 2.01(path) script is vulnerable to remote file inclusion. The vulnerability allows an attacker to include a remote file by manipulating the 'path' parameter in the 'admin_menu.php' file.
The AllMyGuests 3.0 software is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by injecting malicious code into the 'AMG_serverpath' parameter in the 'comments.php' and 'signin.php' files. This allows the attacker to include and execute arbitrary files on the target system.
MyBlog is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
p.mapper is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Galmeta Post is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
basicFramework is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
ReloadCMS is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. Exploiting this issue may allow an unauthorized user to execute local scripts or to view arbitrary files that may contain sensitive information that can aid in further attacks.
CRS Manager is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
The Content*Builder (C*B) application is prone to a remote file-include vulnerability due to insufficient sanitization of user-supplied data. This vulnerability can be exploited by an attacker to compromise the application and the underlying system, potentially leading to further attacks.
The Coppermine Photo Gallery is vulnerable to a cross-site scripting issue and a local file-include issue. Attackers can exploit these vulnerabilities to steal cookie-based authentication credentials, execute arbitrary code, and retrieve arbitrary content within the context of the webserver process.