what you don't know can hurt you
Showing 1 - 25 of 4,091 RSS Feed

File Inclusion Files

Postbird 0.8.4 XSS / LFI / Insecure Data Storage
Posted Jun 1, 2021
Authored by Tridentsec | Site tridentsec.io

Postbird version 0.8.4 suffers from cross site scripting, local file inclusion, and insecure data storage vulnerabilities. Included in this archive is a whitepaper and proof of concept exploit.

tags | exploit, local, vulnerability, xss, proof of concept, file inclusion
advisories | CVE-2021-33570
MD5 | f60c4ad77076831e6c6210dffcd07d54
Trixbox 2.8.0.4 Path Traversal
Posted May 28, 2021
Authored by Ron Jost

Trixbox version 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php.

tags | exploit, php, file inclusion
advisories | CVE-2017-14537
MD5 | ebe53272a318e753d01ffa4b44a12413
Postbird 0.8.4 Cross Site Scripting / Local File Inclusion
Posted May 27, 2021
Authored by Debshubra Chakraborty

Postbird version 0.8.4 suffers from a javascript injection vulnerability that allows for cross site scripting and local file inclusion.

tags | exploit, local, javascript, xss, file inclusion
advisories | CVE-2021-33570
MD5 | f2d171b04734775d46bcc4f5dc3a2213
Schlix CMS 2.2.6-6 Shell Upload / Directory Traversal
Posted May 24, 2021
Authored by Emir Polat

Schlix CMS version 2.2.6-6 suffers from an arbitrary file upload and a directory traversal that together can lead to remote command execution.

tags | exploit, remote, arbitrary, file inclusion, file upload
MD5 | f2f6e3d92179511f87fa66f851387309
Mini Mouse 9.3.0 Local File Inclusion / Path Traversal
Posted Apr 6, 2021
Authored by gosh

Mini Mouse version 9.3.0 suffers from local file inclusion and path traversal vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
MD5 | 5f48132206c39831f6956e4b977d8857
Mini Mouse 9.2.0 Path Traversal
Posted Apr 5, 2021
Authored by gosh

Mini Mouse version 9.2.0 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | bf7068dcc9ec6cf759296e42c7397713
WordPress Delightful Downloads Jquery File Tree 1.6.6 Path Traversal
Posted Mar 22, 2021
Authored by Nicholas Ferreira

WordPress Delightful Downloads Jquery File Tree plugin versions 1.6.6 and below path traversal exploit.

tags | exploit, file inclusion
advisories | CVE-2017-1000170
MD5 | 486a3c691b8eb36346d834cb5c332a48
rConfig 3.9.6 Local File Inclusion
Posted Mar 15, 2021
Authored by 5a65726f

rConfig version 3.9.6 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 98b4a60e9662ee6e4e1ed50a97c5a0bc
Fluig 1.7.0 Path Traversal
Posted Mar 5, 2021
Authored by Lucas Souza

Fluig versions 1.7.0-210217 and below suffer from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | 360e2f6a2b7d7edb421a3de50030196a
Yeastar TG400 GSM Gateway 91.3.0.3 Path Traversal
Posted Feb 26, 2021
Authored by SQSamir | Site github.com

Yeastar TG400 GSM Gateway version 91.3.0.3 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2021-27328
MD5 | a467c9ff54325292a1cc919f562ee67f
SolarWinds Serv-U FTP Server 15.2.1 Path Traversal
Posted Feb 12, 2021
Authored by Jack Misiura

SolarWinds Serv-U File Server versions through 15.2.1 do not correctly validate path information, allowing the disclosure of files and directories outside of the user's home directory via a specially crafted GET request.

tags | exploit, file inclusion
advisories | CVE-2020-27994
MD5 | bcff8e686a6d68a1e71f68016c03b076
WordPress Supsystic Backup 2.3.9 Local File Inclusion
Posted Feb 8, 2021
Authored by Erik David Martin

WordPress Supsystic Backup plugin version 2.3.9 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | aa7db6fb704f48b330319ce9f9b505e6
WordPress Supsystic Digital Publications 1.6.9 XSS / DoS / Traversal
Posted Feb 8, 2021
Authored by Erik David Martin

WordPress Supsystic Digital Publications plugin version 1.6.9 suffers from cross site scripting, denial of service, and traversal vulnerabilities.

tags | exploit, denial of service, vulnerability, xss, file inclusion
MD5 | 20cf753fe2b0be4cf71a7b33d728cf4f
WordPress 5.0.0 Remote Code Execution
Posted Feb 1, 2021
Authored by OUSSAMA Rahali | Site blog.ripstech.com

WordPress versions 5.0.0 and 4.9.8 and below remote code execution exploit that leverages path traversal and file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
advisories | CVE-2019-8943
MD5 | 87ecab4766942bdc35c24a3b4d93d1dd
Home Assistant Community Store 1.10.0 Path Traversal
Posted Jan 29, 2021
Authored by Lyghtnox

Home Assistant Community Store (HACS) version 1.10.0 suffers from a path traversal vulnerability that allows for account takeover.

tags | exploit, file inclusion
MD5 | 2e4344a9f1aa53aed3bf84cb9d2bc67d
EyesOfNetwork 5.3 Local File Inclusion
Posted Jan 11, 2021
Authored by Audencia Business School Red Team

EyesOfNetwork version 5.3 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 88fd5acc1e0c31de7e01d0c3cfd29bc1
Responsive FileManager 9.13.4 Path Traversal
Posted Jan 5, 2021
Authored by SunCSR

Responsive FileManager version 9.13.4 path traversal exploit. Original discovery of this finding is attributed to farisv in December of 2018.

tags | exploit, file inclusion
MD5 | 576b9b1598c826767542e7d40705bbc2
Gotenberg 6.2.0 Traversal / Code Execution / Insecure Permissions
Posted Jan 4, 2021
Authored by Blazej Adamczyk

Gotenberg versions 6.2.0 and below suffer from directory traversal, code execution, and insecure permission vulnerabilities.

tags | exploit, vulnerability, code execution, file inclusion
advisories | CVE-2020-13449, CVE-2020-13450, CVE-2020-13451, CVE-2020-13452
MD5 | a91eed6c85bc9e21292b509d9c121d3a
Rocket.Chat Path Traversal
Posted Dec 22, 2020
Authored by Moe Szyslak

Rocket.Chat suffers from a path traversal vulnerability.

tags | advisory, file inclusion
MD5 | 497aca2c2e16a627c295b8a37f6b49a7
WordPress Duplicator 1.3.26 Directory Traversal / File Read
Posted Dec 18, 2020
Authored by Hoa Nguyen, Ramuel Gall | Site metasploit.com

This Metasploit module exploits an unauthenticated directory traversal vulnerability in WordPress Duplicator plugin versions 1.3.24 through 1.3.26, allowing arbitrary file read with the web server privileges. This vulnerability was being actively exploited when it was discovered.

tags | exploit, web, arbitrary, file inclusion
advisories | CVE-2020-11738
MD5 | 25786101984968ff048b1ccf1294f760
Task Management System 1.0 Local File Inclusion
Posted Dec 15, 2020
Authored by Ismail Bozkurt

Task Management System version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 34b7e2cf93770d5be340a0dc747d2533
Cisco ASA 9.14.1.10 / FTD 6.6.0.1 Path Traversal
Posted Dec 15, 2020
Authored by Freakyclown

Cisco ASA version 9.14.1.10 and FTD version 6.6.0.1 path traversal exploit. Original discovery of this vulnerability is attributed to 3ndG4me in October of 2020.

tags | exploit, file inclusion
systems | cisco
advisories | CVE-2020-3452
MD5 | 7cf23b4f5854a2f296a17705db8fae41
Seacms 11.1 Local File Inclusion
Posted Dec 12, 2020
Authored by j5s

Seacms version 11.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 4f0b0f0a174adaf8dba76ff066184250
Advanced Component System (ACS) 1.0 Path Traversal
Posted Dec 11, 2020
Authored by Francisco Javier Santiago Vazquez

Advanced Component System (ACS) version 1.0 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | c0df758f96538e1b8ac9689218a081ad
Rukovoditel 2.6.1 Shell Upload / Local File Inclusion
Posted Dec 11, 2020
Authored by coiffeur

Rukovoditel version 2.6.1 remote code execution exploit that leverages shell upload and local file inclusion vulnerabilities.

tags | exploit, remote, shell, local, vulnerability, code execution, file inclusion
MD5 | e2fa9c797d92a57016481570e269e9e5
Page 1 of 164
Back12345Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close