exploit the possibilities
Showing 1 - 25 of 4,087 RSS Feed

File Inclusion Files

Mini Mouse 9.3.0 Local File Inclusion / Path Traversal
Posted Apr 6, 2021
Authored by gosh

Mini Mouse version 9.3.0 suffers from local file inclusion and path traversal vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
MD5 | 5f48132206c39831f6956e4b977d8857
Mini Mouse 9.2.0 Path Traversal
Posted Apr 5, 2021
Authored by gosh

Mini Mouse version 9.2.0 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | bf7068dcc9ec6cf759296e42c7397713
WordPress Delightful Downloads Jquery File Tree 1.6.6 Path Traversal
Posted Mar 22, 2021
Authored by Nicholas Ferreira

WordPress Delightful Downloads Jquery File Tree plugin versions 1.6.6 and below path traversal exploit.

tags | exploit, file inclusion
advisories | CVE-2017-1000170
MD5 | 486a3c691b8eb36346d834cb5c332a48
rConfig 3.9.6 Local File Inclusion
Posted Mar 15, 2021
Authored by 5a65726f

rConfig version 3.9.6 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 98b4a60e9662ee6e4e1ed50a97c5a0bc
Fluig 1.7.0 Path Traversal
Posted Mar 5, 2021
Authored by Lucas Souza

Fluig versions 1.7.0-210217 and below suffer from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | 360e2f6a2b7d7edb421a3de50030196a
Yeastar TG400 GSM Gateway 91.3.0.3 Path Traversal
Posted Feb 26, 2021
Authored by SQSamir | Site github.com

Yeastar TG400 GSM Gateway version 91.3.0.3 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2021-27328
MD5 | a467c9ff54325292a1cc919f562ee67f
SolarWinds Serv-U FTP Server 15.2.1 Path Traversal
Posted Feb 12, 2021
Authored by Jack Misiura

SolarWinds Serv-U File Server versions through 15.2.1 do not correctly validate path information, allowing the disclosure of files and directories outside of the user's home directory via a specially crafted GET request.

tags | exploit, file inclusion
advisories | CVE-2020-27994
MD5 | bcff8e686a6d68a1e71f68016c03b076
WordPress Supsystic Backup 2.3.9 Local File Inclusion
Posted Feb 8, 2021
Authored by Erik David Martin

WordPress Supsystic Backup plugin version 2.3.9 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | aa7db6fb704f48b330319ce9f9b505e6
WordPress Supsystic Digital Publications 1.6.9 XSS / DoS / Traversal
Posted Feb 8, 2021
Authored by Erik David Martin

WordPress Supsystic Digital Publications plugin version 1.6.9 suffers from cross site scripting, denial of service, and traversal vulnerabilities.

tags | exploit, denial of service, vulnerability, xss, file inclusion
MD5 | 20cf753fe2b0be4cf71a7b33d728cf4f
WordPress 5.0.0 Remote Code Execution
Posted Feb 1, 2021
Authored by OUSSAMA Rahali | Site blog.ripstech.com

WordPress versions 5.0.0 and 4.9.8 and below remote code execution exploit that leverages path traversal and file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
advisories | CVE-2019-8943
MD5 | 87ecab4766942bdc35c24a3b4d93d1dd
Home Assistant Community Store 1.10.0 Path Traversal
Posted Jan 29, 2021
Authored by Lyghtnox

Home Assistant Community Store (HACS) version 1.10.0 suffers from a path traversal vulnerability that allows for account takeover.

tags | exploit, file inclusion
MD5 | 2e4344a9f1aa53aed3bf84cb9d2bc67d
EyesOfNetwork 5.3 Local File Inclusion
Posted Jan 11, 2021
Authored by Audencia Business School Red Team

EyesOfNetwork version 5.3 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 88fd5acc1e0c31de7e01d0c3cfd29bc1
Responsive FileManager 9.13.4 Path Traversal
Posted Jan 5, 2021
Authored by SunCSR

Responsive FileManager version 9.13.4 path traversal exploit. Original discovery of this finding is attributed to farisv in December of 2018.

tags | exploit, file inclusion
MD5 | 576b9b1598c826767542e7d40705bbc2
Gotenberg 6.2.0 Traversal / Code Execution / Insecure Permissions
Posted Jan 4, 2021
Authored by Blazej Adamczyk

Gotenberg versions 6.2.0 and below suffer from directory traversal, code execution, and insecure permission vulnerabilities.

tags | exploit, vulnerability, code execution, file inclusion
advisories | CVE-2020-13449, CVE-2020-13450, CVE-2020-13451, CVE-2020-13452
MD5 | a91eed6c85bc9e21292b509d9c121d3a
Rocket.Chat Path Traversal
Posted Dec 22, 2020
Authored by Moe Szyslak

Rocket.Chat suffers from a path traversal vulnerability.

tags | advisory, file inclusion
MD5 | 497aca2c2e16a627c295b8a37f6b49a7
WordPress Duplicator 1.3.26 Directory Traversal / File Read
Posted Dec 18, 2020
Authored by Hoa Nguyen, Ramuel Gall | Site metasploit.com

This Metasploit module exploits an unauthenticated directory traversal vulnerability in WordPress Duplicator plugin versions 1.3.24 through 1.3.26, allowing arbitrary file read with the web server privileges. This vulnerability was being actively exploited when it was discovered.

tags | exploit, web, arbitrary, file inclusion
advisories | CVE-2020-11738
MD5 | 25786101984968ff048b1ccf1294f760
Task Management System 1.0 Local File Inclusion
Posted Dec 15, 2020
Authored by Ismail Bozkurt

Task Management System version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 34b7e2cf93770d5be340a0dc747d2533
Cisco ASA 9.14.1.10 / FTD 6.6.0.1 Path Traversal
Posted Dec 15, 2020
Authored by Freakyclown

Cisco ASA version 9.14.1.10 and FTD version 6.6.0.1 path traversal exploit. Original discovery of this vulnerability is attributed to 3ndG4me in October of 2020.

tags | exploit, file inclusion
systems | cisco
advisories | CVE-2020-3452
MD5 | 7cf23b4f5854a2f296a17705db8fae41
Seacms 11.1 Local File Inclusion
Posted Dec 12, 2020
Authored by j5s

Seacms version 11.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 4f0b0f0a174adaf8dba76ff066184250
Advanced Component System (ACS) 1.0 Path Traversal
Posted Dec 11, 2020
Authored by Francisco Javier Santiago Vazquez

Advanced Component System (ACS) version 1.0 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | c0df758f96538e1b8ac9689218a081ad
Rukovoditel 2.6.1 Shell Upload / Local File Inclusion
Posted Dec 11, 2020
Authored by coiffeur

Rukovoditel version 2.6.1 remote code execution exploit that leverages shell upload and local file inclusion vulnerabilities.

tags | exploit, remote, shell, local, vulnerability, code execution, file inclusion
MD5 | e2fa9c797d92a57016481570e269e9e5
Sony BRAVIA Digital Signage 1.7.8 Unauthenticated Remote File Inclusion
Posted Dec 3, 2020
Authored by LiquidWorm | Site zeroscience.mk

Sony BRAVIA Digital Signage versions 1.7.8 and below are vulnerable to a remote file inclusion vulnerability by including arbitrary client-side dynamic scripts (JavaScript, VBScript, HTML) when adding content though the input URL material of type html. This allows hijacking of the current session of the user, execute cross-site scripting code, or changing the look of the page and content modification on current display.

tags | exploit, remote, arbitrary, javascript, xss, file inclusion
MD5 | 85b5e3c8c9cb495114ef096e2616e76a
Simple College Website 1.0 Local File Inclusion
Posted Dec 2, 2020
Authored by mosaaed

Simple College Website version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 86b49885d775e8eb45bc78ef1e69613a
Car Rental Management System 1.0 Local File Inclusion / SQL Injection
Posted Dec 2, 2020
Authored by mosaaed

Car Rental Management System version 1.0 suffers from local file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
MD5 | 3a68203e8a08bc0b1358a7badb0e67c3
TestBox CFML Test Framework 4.1.0 Directory Traversal
Posted Nov 19, 2020
Authored by Darren King

TestBox CFML Test Framework version 4.1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 88450fd3a243fe57d5806f5e6b84c134
Page 1 of 164
Back12345Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close