exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 4,172 RSS Feed

File Inclusion Files

OpenText Extended ECM 22.3 File Deletion / LFI / Privilege Escsalation
Posted Jan 20, 2023
Authored by Armin Stock | Site sec-consult.com

OpenText Extended ECM versions 16.2.2 through 22.3 suffer from arbitrary file deletion, information disclosure, local file inclusion, and privilege escalation vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, file inclusion, info disclosure
advisories | CVE-2022-45922, CVE-2022-45924, CVE-2022-45925, CVE-2022-45926, CVE-2022-45928
SHA-256 | 878b6d4e07e3ca1216865ef2e9312235d0ef20675c4ac011f7949b86a24ac5af
WordPress Slider Revolution 4.9.2 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.9.2 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | b974aee33a66e29925be0ab29843b305b114f9a63e635ad75ca2c10d50af3474
WordPress Slider Revolution 4.6.5 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.6.5 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | c0ad551826885e99515a7f31a6660bf3f6f546a33382b918ec3a80f8f2c57bbc
WordPress Slider Revolution 4.1.3 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.1.3 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 83b023ff748b63a814933d6674398e32e4fb2ba5c520cc7997e01b2a23da875c
WordPress Slider Revolution 4.1.2 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.1.2 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | d3b71e6cca26b526cd8c1ef3f9be1a645c838d5b2349fa4c8be240892908d108
WordPress Slider Revolution 3.0.8 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 3.0.8 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 129c075ad285b288723e5f16312e3c90c87bccd10a3436f09ab9fdb5cfb03d53
Hughes Satellite Router Remote File Inclusion Cross Frame Scripting
Posted Dec 29, 2022
Authored by LiquidWorm | Site zeroscience.mk

Hughes Satellite Router contains a cross-frame scripting via remote file inclusion vulnerability that may potentially be exploited by malicious users to compromise an affected system. This vulnerability may allow an unauthenticated malicious user to misuse frames, include JS/HTML code and steal sensitive information from legitimate users of the application. Affected versions include HX200 8.3.1.14, HX90 6.11.0.5, HX50L 6.10.0.18, HN9460 8.2.0.48, and HN7000S 6.9.0.37.

tags | exploit, remote, file inclusion
SHA-256 | 01732a937c344613efd7c1ef744f546511c874deecd845ef0ca2d232baf0e177
ILIAS eLearning 7.15 Command Injection / XSS / LFI / Open Redirect
Posted Dec 9, 2022
Authored by Anna Hartig, Niklas Schilling, Constantin Schwarz | Site sec-consult.com

ILIAS eLearning versions 7.15 and below suffer from authenticated command injection, persistent cross site scripting, local file inclusion, and open redirection vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
advisories | CVE-2022-45915, CVE-2022-45916, CVE-2022-45917, CVE-2022-45918
SHA-256 | ee31da97db0bda4a3b42019ff3e199e34d24625e0b83fa1d18f2b97da9c2728c
py7zr 0.20.0 Directory Traversal
Posted Dec 7, 2022
Authored by Matteo Cosentino

A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr versions 0.20.0 and earlier allows attackers to read arbitrary files on the local machine via a malicious 7z file extraction.

tags | exploit, arbitrary, local, python, file inclusion
advisories | CVE-2022-44900
SHA-256 | 7aa7ca72652dab91234127d8332a19316f0f61be17e1c626e65aae18d9435347
Drupal H5P Module 2.0.0 Zip Slip Traversal
Posted Dec 5, 2022
Authored by EgiX | Site karmainsecurity.com

Drupal H5P Module versions 2.0.0 and below suffer from a traversal vulnerability when handling a zipped filename on windows.

tags | exploit, file inclusion
systems | windows
SHA-256 | 29cd61d23f4b78dbb93cdc479cba570c70b094e72db31910170d0c3eb73d58f8
AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 Path Traversal
Posted Nov 11, 2022
Authored by Jens Regel

AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2022-23854
SHA-256 | a78de92013681ef6d9eab5f28cda6712397f5a30d67a7a27854785925a87f96a
SAP Manufacturing Execution Core 15.3 Path Traversal
Posted Oct 17, 2022
Authored by RedRays

SAP Manufacturing Execution Core versions 15.1 through 15.3 suffer from a path traversal vulnerability.

tags | advisory, file inclusion
advisories | CVE-2022-39802
SHA-256 | d2c66b61de7a4021d8a7f4c40b09c163f1f708ce3aa8581767e5edaefd4cc198
PhotoSync 4.7 Local File Inclusion
Posted Sep 19, 2022
Authored by Chokri Hammedi

PhotoSync version 4.7 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | f5e6b3cd183e91afacf647b3547160e0d93026087e059f1843c8761cd5e32985
Owlfiles File Manager 12.0.1 Path Traversal / Local File Inclusion
Posted Sep 19, 2022
Authored by Chokri Hammedi

Owlfiles File Manager version 12.0.1 suffers from local file inclusion and path traversal vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 5e1df728b64bebf1797218fca034b9eeed532e773c31131307d679d65b406b40
InTouch Access Anywhere Secure Gateway 2020 R2 Path Traversal
Posted Sep 9, 2022
Authored by Jens Regel | Site crisec.de

InTouch Access Anywhere Secure Gateway versions 2020 R2 and below suffer from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2022-23854
SHA-256 | c9873dff912c339fc99f6c1c0d26c32ecee59d977893de8864d051af5bba5038
@Drive 2.8 Local File Inclusion
Posted Sep 9, 2022
Authored by Chokri Hammedi

@Drive version 2.8 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 1c242342304c59d9a82db2eb45e80f971e783004a6b81e805655fb5adc09c690
FE File Explorer 11.0.4 Local File Inclusion
Posted Sep 7, 2022
Authored by Chokri Hammedi

FE File Explorer version 11.0.4 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 9596719bde6a381ce9f18435b2517e8ecf2d1838ab031974d2c37d361f760254
FTPManager 8.2 Local File Inclusion / Directory Traversal
Posted Sep 7, 2022
Authored by Chokri Hammedi

FTPManager version 8.2 suffers from local file inclusion and directory traversal vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 3e761447e17269780279f6f239a28cde76f4d7d642e4fd2bf87303f7df3f583c
Wifi HD Wireless Disk Drive 11 Local File Inclusion
Posted Sep 6, 2022
Authored by Chokri Hammedi

Wifi HD Wireless Disk Drive version 11 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b20518edc15d62d991e82375c15b066d88b50865b9271eeedc4ac3a8e580a204
FLIR AX8 1.46.16 Traversal / Access Control / Command Injection / XSS
Posted Aug 19, 2022
Authored by Samy Younsi, Thomas Knudsen

FLIR AX8 versions 1.46.16 and below suffer from command injection, directory traversal, improper access control, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
advisories | CVE-2022-37060, CVE-2022-37061, CVE-2022-37062, CVE-2022-37063
SHA-256 | d4b0fa3d39bb7d9eb67520d399557821deb5682ab4e0f91e473b5af510fec4d7
uftpd 2.10 Directory Traversal
Posted Aug 2, 2022
Authored by Aaron Esau

uftpd versions 2.7 through 2.10 suffer from an authenticated directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2020-20277
SHA-256 | 49eb3cd8623927e2347974445c0565c0ed3386c36a6f12fc4e148713a5029fd8
Omnia MPX 1.5.0+r1 Path Traversal
Posted Aug 1, 2022
Authored by Momen Eldawakhly

Omnia MPX version 1.5.0+r1 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 255a6f7727bdeaa16975148c3367339b2e812a601460e5e6e74bd1dfbe0dd441
CuteEditor For PHP 6.6 Directory Traversal
Posted Aug 1, 2022
Authored by Stefan Hesselman

CuteEditor For PHP version 6.6 suffers from a directory traversal vulnerability.

tags | exploit, php, file inclusion
SHA-256 | 7af1d2df53c59d35bae895eb4619ecd262232aacf7df548b05790ea206f4dec7
mPDF 7.0 Local File Inclusion
Posted Aug 1, 2022
Authored by Musyoka Ian

mPDF version 7.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d9e2013ea0d6ee6260c03fe9651f945af86d37023bb012c16b218a5ba2c4c1f8
SolarView Compact 6.00 Directory Traversal
Posted Jun 3, 2022
Authored by Ahmed Alroky

SolarView Compact version 6.00 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2022-29298
SHA-256 | 76fa7594e9d56713a54e10432aeac724bc02a1a6c903e3b19cb19936c489db0c
Page 1 of 167
Back12345Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close