what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 4,277 RSS Feed

File Inclusion Files

Seo Panel 4.10.0 Remote File Inclusion
Posted Sep 27, 2024
Authored by indoushka

Seo Panel version 4.10.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2fdf761dbcf0a177ff1181fce94ad134d7bd768b3f71e66a322977609630415f
Sample Blog Site 1.0 Remote File Inclusion
Posted Sep 27, 2024
Authored by indoushka

Sample Blog Site version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 4f6ee68a6c536fed1167da6a84c5b39fb5d6773e2ab01a72d0112f0d091435a9
Invesalius 3.1.99995 Arbitrary File Write / Directory Traversal
Posted Sep 23, 2024
Authored by Riccardo Degli Esposti

Proof of concept python3 code that creates a malicious payload to exploit an arbitrary file write via directory traversal in Invesalius version 3.1. In particular the exploitation steps of this vulnerability involve the use of a specifically crafted .inv3 (a custom extension for InVesalius) that is indeed a tar file file which, once imported inside the victim's client application allows an attacker to write files and folders on the disk.

tags | exploit, arbitrary, proof of concept, file inclusion
advisories | CVE-2024-44825
SHA-256 | 3e2115a5ac5563793a0f2c821d2286084e05076d87ec7793c02b372c65ca4475
BlackNET 3.7.0.0 Missing Authentication / File Deletion / Traversal
Posted Sep 20, 2024
Authored by bRpsd

BlackNET version 3.7.0.0 appears to allow unauthenticated access to modify data and suffers from arbitrary file deletion and directory traversal vulnerabilities while authenticated.

tags | exploit, arbitrary, vulnerability, file inclusion
SHA-256 | 6e54154264109ce0380fee45cc8dba495239a6e22843e4f8d07ddd298e5af855
Online Survey System 1.0 Cross Site Scripting / Remote File Inclusion
Posted Sep 11, 2024
Authored by indoushka

Online Survey System version 1.0 suffers from cross site scripting and remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, xss, file inclusion
SHA-256 | 0573d4aa4fad74ba21dfae8c95d8a0ef8922ce6bbbf5c65fcd1a8b98424e3d9e
Online Survey System 1.0 Remote File Inclusion
Posted Sep 10, 2024
Authored by indoushka

Online Survey System version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 9ac49e540003cc98bbab6ed47333ffe2f4616bc3a383f48fe3a342e9a7dd83cc
Apache Axis2 1.4.1 Local File Inclusion
Posted Sep 1, 2024
Authored by Tiago Ferreira | Site metasploit.com

This Metasploit module exploits an Apache Axis2 v1.4.1 local file inclusion (LFI) vulnerability. By loading a local XML file which contains a cleartext username and password, attackers can trivially recover authentication credentials to Axis services.

tags | exploit, local, file inclusion
SHA-256 | 50104ff91cd322fe465188779cfaa98819e42e8898505fa53d0efc5a47d67e68
Supra Smart Cloud TV Remote File Inclusion
Posted Aug 31, 2024
Authored by wvu, Dhiraj Mishra | Site metasploit.com

This Metasploit module exploits an unauthenticated remote file inclusion which exists in Supra Smart Cloud TV. The media control for the device doesnt have any session management or authentication. Leveraging this, an attacker on the local network can send a crafted request to broadcast a fake video.

tags | exploit, remote, local, file inclusion
advisories | CVE-2019-12477
SHA-256 | 4f628334a1d4a905d86ed3e418a091bc45e99144a8e83f1ac6d4d534bdfe0adf
Ray Static Arbitrary File Read
Posted Aug 31, 2024
Authored by byt3bl33d3r, Takahiro Yokoyama, danmcinerney | Site metasploit.com

Ray versions prior to 2.8.1 are vulnerable to a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2023-6020
SHA-256 | bd052a339883d4fb2b7584d0b637a7cf11576c8925a84f832d496feb70c87eff
QNAP QTS and Photo Station Local File Inclusion
Posted Aug 31, 2024
Authored by Henry Huang, Redouane Niboucha | Site metasploit.com

This Metasploit module exploits a local file inclusion in QNAP QTS and Photo Station that allows an unauthenticated attacker to download files from the QNAP filesystem. Because the HTTP server runs as root, it is possible to access sensitive files, such as SSH private keys and password hashes. This Metasploit module has been tested on QTS 4.3.3 (unknown Photo Station version) and QTS 4.3.6 with Photo Station 5.7.9.

tags | exploit, web, local, root, file inclusion
advisories | CVE-2019-7192, CVE-2019-7194, CVE-2019-7195
SHA-256 | 70107b0adbe195b76131c10cdea4a24c8ea076a3a1b93c6596908a86f7bcd91a
Webpay E-Commerce 1.0 Directory Traversal
Posted Aug 30, 2024
Authored by indoushka

Webpay E-Commerce version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 95d09ce8c5598b697d3b00aaac726a002f69525139a53abe89bf0d0c71fcfd96
Laundry Management System 1.0 Remote File Inclusion
Posted Aug 28, 2024
Authored by indoushka

Laundry Management System version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 8fab3cbba3b63d49ce3f1398516dff725855194afb4b9b834d890bf1ab8dff45
miniProxy 1.0.0 Remote File Inclusion
Posted Aug 27, 2024
Authored by indoushka

miniProxy version 1.0.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 047d93955456ff76bf4deec8dd78b76d6fa4d853a8417d1dc141f9097b959a9b
Loan Management System 1.0 Remote File Inclusion
Posted Aug 27, 2024
Authored by indoushka

Loan Management System version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2f2cc5727791f8bddc23fe859702870ea920208518f2390ce07b09959a99f153
FlatPress 1.3.1 Path Traversal
Posted Aug 15, 2024
Authored by indoushka

FlatPress version 1.3.1 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 93132facf1686cadc1ae8f70b92c43ad1314fd717d542ca0f3d2460a2af23e80
Farmacia Gama 1.0 File Inclusion
Posted Aug 9, 2024
Authored by indoushka

Farmacia Gama version 1.0 suffers from a file inclusion vulnerability.

tags | exploit, code execution, file inclusion
SHA-256 | da80354c20c11213cf9464c89b3c9342e5d18753a59bd94e104156db88b776d5
Red Hat Security Advisory 2024-5102-03
Posted Aug 9, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5102-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Issues addressed include code execution, double free, memory leak, null pointer, remote file inclusion, and use-after-free vulnerabilities.

tags | advisory, remote, kernel, vulnerability, code execution, memory leak, file inclusion
systems | linux, redhat
advisories | CVE-2021-46939
SHA-256 | 271ebfd79d65d0fd7f0eaf5bfbcc5f0749c2bb655bb3ab858b0da3d97429fe08
Bleve Library Traversal
Posted Aug 8, 2024
Authored by rcorrea35 | Site github.com

This is a path traversal vulnerability that impacts the CreateIndexHandler and DeleteIndexHandler found within Bleve search library. These vulnerabilities enable the attacker to delete any directory owned by the user recursively, and create a new directory in any location which the server has write permissions to. This is Google's proof of concept exploit.

tags | exploit, vulnerability, proof of concept, file inclusion
SHA-256 | fa85d4f73ca7779ddd8389e832e0e1c1e86090421d04d1696926164a39351fbf
E-Commerce Site Using PHP PDO 1.0 Directory Traversal
Posted Aug 7, 2024
Authored by indoushka

E-Commerce Site using PHP PDO version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, php, file inclusion
SHA-256 | dc27958888a7f9ea33c2b82b09c46ed99740992adc97c22cbcb4c4b71184b5d1
Devika 1 Path Traversal
Posted Aug 5, 2024
Authored by Alperen Ergel

Devika version 1 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2024-40422
SHA-256 | a1faa88d45aec3e4e47f6aaf83509670b4fb84ce15462308d2e7daa8d66d754c
Perten Instruments Process Plus Software 1.11.6507.0 LFI / Hardcoded Credentials
Posted Jul 23, 2024
Authored by T. Weber, S. Dietz | Site cyberdanube.com

Perten Instruments Process Plus Software versions 1.11.6507.0 and below suffer from local file inclusion, hardcoded credential, and execution with unnecessary privilege vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
advisories | CVE-2024-6911, CVE-2024-6912, CVE-2024-6913
SHA-256 | 92c6be9a95dec36f75c305fd1ec54275736478e25459c036cab67f945826b0f2
Sharp Multi-Function Printer 18 Vulnerabilities
Posted Jul 4, 2024
Authored by Pierre Kim | Site pierrekim.github.io

308 different models of Sharp Multi-Function Printers (MFP) are vulnerable to 18 different vulnerabilities including remote code execution, local file inclusion, credential disclosure, and more.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
advisories | CVE-2024-28038, CVE-2024-28955, CVE-2024-29146, CVE-2024-29978, CVE-2024-32151, CVE-2024-33605, CVE-2024-33610, CVE-2024-33616, CVE-2024-34162, CVE-2024-35244, CVE-2024-36248, CVE-2024-36251
SHA-256 | b34130e7b38cd2d4de974b3c5bbaf20487c4ecc369b0ca9066b9c81dd1667a8e
Apache OFBiz 18.12.12 Directory Traversal
Posted May 20, 2024
Authored by Abdualhadi Khalifa

Apache OFBiz versions 18.12.12 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | bbe9f4e67d6b0040e47db9f61ccb61a6f0acf6e3a56d3be47bd40696ca022cef
CrushFTP Directory Traversal
Posted May 14, 2024
Authored by Abdualhadi Khalifa

CrushFTP versions prior to 11.1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | f6f0dfaaef61e480d92184b9e2c78f7ab875206b68a377d6f7d4d096b36e0e6b
Jenkins 2.441 Local File Inclusion
Posted Apr 15, 2024
Authored by Matisse Beckandt

Jenkins version 2.441 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2024-23897
SHA-256 | bd541e95b84e90dc4cbb0bfe35af5cd5870fc359b6d836f3a3eb70857003a87a
Page 1 of 172
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    39 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close