exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 4,263 RSS Feed

File Inclusion Files

MAC 1200R Directory Traversal
Posted Apr 10, 2023
Authored by Chunlei Shang

MAC 1200R suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2021-27825
SHA-256 | cc4a576cc94005c55249f862b11f21f974110400ba2bffb27f5d3d1d6e367c9e
Mitel MiCollab AWV 8.1.2.4 / 9.1.3 Directory Traversal / LFI
Posted Apr 6, 2023
Authored by Kahvi-0

Mitel MiCollab AWV versions 8.1.2.4 and 9.1.3 suffers from a directory traversal and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
advisories | CVE-2020-11798
SHA-256 | 652271da9011a184431640fd4bd3658e894c9f798d0f2d89bb23cfbba548010e
Titan FTP Path Traversal
Posted Apr 6, 2023
Authored by Andreas Finstad

Titan FTP server versions prior to 2.0.1.2102 suffer from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2023-22629
SHA-256 | fd0dc5c1c95468de1b1d79053319ac8014cd507a3d9eb4eaddfc41e0211fa0ce
GLPI Activity Local File Inclusion
Posted Apr 3, 2023
Authored by Nuri Cilengir

GLPI Activity versions prior to 3.1.0 suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2022-34125
SHA-256 | 6ce5495c03b7f011dbd108f97157d1d7c2747d04e180ecbb3ccb9944f6dee833
GLPI Glpiinventory 1.0.1 Local File Inclusion
Posted Apr 3, 2023
Authored by Nuri Cilengir

GLPI Glpiinventory versions 1.0.1 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2022-31062
SHA-256 | 2437abe95d6ebe38784c4e84318845d94947485a47c460c2d8aba16cf6aa4c71
GLPI Manageentities Local File Inclusion
Posted Apr 3, 2023
Authored by Nuri Cilengir

GLPI Manageentities versions prior to 4.0.2 suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2022-34127
SHA-256 | 8a2a552ceddbc28ec6fe9c4a71ec68d869d1d3401907f3ca5dba7c8ec767d3b3
MyBB 1.8.32 Remote Code Execution
Posted Apr 3, 2023
Authored by lUc1f3r11

MyBB version 1.8.32 chained local file inclusion remote code execution exploit.

tags | exploit, remote, local, code execution, file inclusion
SHA-256 | 67d58bc6ae01a7f1cf034d1c972b7a85cd0e3f0f884de1a2d9721c4f4cbd09ce
Virtual Reception 1.0 Directory Traversal
Posted Mar 30, 2023
Authored by Spinae

Virtual Reception version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 8e6ab59605f1f4d16d9e84559bfbc1cc7334ebb367d1996dfd274122c598c62b
YouPHPTube 7.8 Local File Inclusion / Directory Traversal
Posted Mar 28, 2023
Authored by Rafael Pedrero

YouPHPTube versions 7.8 and below suffer from local file inclusion and directory traversal vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | fb3e42eecf910a2436823c9d614a4b6500e8b3b9637e0652a2e73e9fc8287070
WPN-XM Serverstack For Windows 0.8.6 XSS / LFI / Traversal
Posted Mar 27, 2023
Authored by Rafael Pedrero

WPN-XM Serverstack for Windows version 0.8.6 suffers from cross site scripting, local file inclusion, and path traversal vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
systems | windows
SHA-256 | ba0708cc5dc30c248dff73fe133d54a07726c0ef4f797720b6548f5184c612f3
Lavalite 9.0.0 Path Traversal
Posted Mar 27, 2023
Authored by nu11secur1ty

Lavalite version 9.0.0 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | d6085d1df4bbceda7849d49a14e340d1311171cc8e2f1b42c855dce50beb5675
ABUS Security Camera TVIP 20000-21150 LFI / Remote Code Execution
Posted Feb 27, 2023
Authored by d1g

ABUS Security Camera version TVIP 20000-21150 suffers from local file inclusion, hardcoded credential, and command injection vulnerabilities. When coupled together, they can be leveraged to achieve remote access as root via ssh.

tags | exploit, remote, local, root, vulnerability, file inclusion
advisories | CVE-2023-26609
SHA-256 | 92decaa3308d461393dc637c13861ced7bcb4cd43a2c333235f9835ee562ecb9
Device Manager Express 7.8.20002.47752 SQL Injection / XSS / Code Execution / Traversal
Posted Feb 23, 2023
Authored by Eric Flokstra

Device Manager Express versions 7.8.20002.47752 and below suffer from code execution, command execution, cross site scripting, remote SQL injection, and traversal vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, sql injection, file inclusion
advisories | CVE-2022-24627, CVE-2022-24628, CVE-2022-24629, CVE-2022-24630, CVE-2022-24631, CVE-2022-24632
SHA-256 | 9f6dbcbbd09678c80d311d3e820d1c82de2bd7a04264742755ac9d8302b00c0f
Kardex Mlog MCC 5.7.12+0-a203c2a213-master File Inclusion / Remote Code Execution
Posted Feb 17, 2023
Authored by Patrick Hener, Nico Viakowski | Site hesec.de

Kardex Mlog MCC version 5.7.12+0-a203c2a213-master suffers from a file inclusion vulnerability that allows for remote code execution.

tags | exploit, remote, code execution, file inclusion
advisories | CVE-2023-22855
SHA-256 | 960e6d130eb7b30180562e91395b84ea4b20026b7ec3c0ea3b55a62820151341
ChiKoi 1.0 Directory Traversal
Posted Feb 10, 2023
Authored by indoushka

ChiKoi version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | f6f4c9a329aacc62158437feb049e556fbc94806ccce29cccc65207d028728aa
WordPress Quick Restaurant 2.0.2 XSS / CSRF / IDOR / Missing Authorization
Posted Feb 2, 2023
Authored by Marco Wotschka, Ivan Kuzymchak | Site wordfence.com

On January 16, 2023, the Wordfence Threat Intelligence team responsibly disclosed several vulnerabilities in Quick Restaurant Menu, a WordPress plugin that allows users to set up restaurant menus on their sites. This plugin is vulnerable to missing authorization, insecure direct object reference, cross site request forgery as well as cross site scripting in versions up to, and including, 2.0.2.

tags | advisory, vulnerability, code execution, xss, file inclusion, csrf
advisories | CVE-2023-0550, CVE-2023-0554, CVE-2023-0555
SHA-256 | e3ba7e7e5a2df6cde42d9ee75f8bec79e5251c694adb11dfae0969e813acffdb
OpenText Extended ECM 22.3 File Deletion / LFI / Privilege Escsalation
Posted Jan 20, 2023
Authored by Armin Stock | Site sec-consult.com

OpenText Extended ECM versions 16.2.2 through 22.3 suffer from arbitrary file deletion, information disclosure, local file inclusion, and privilege escalation vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, file inclusion, info disclosure
advisories | CVE-2022-45922, CVE-2022-45924, CVE-2022-45925, CVE-2022-45926, CVE-2022-45928
SHA-256 | 878b6d4e07e3ca1216865ef2e9312235d0ef20675c4ac011f7949b86a24ac5af
WordPress Slider Revolution 4.9.2 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.9.2 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | b974aee33a66e29925be0ab29843b305b114f9a63e635ad75ca2c10d50af3474
WordPress Slider Revolution 4.6.5 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.6.5 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | c0ad551826885e99515a7f31a6660bf3f6f546a33382b918ec3a80f8f2c57bbc
WordPress Slider Revolution 4.1.3 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.1.3 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 83b023ff748b63a814933d6674398e32e4fb2ba5c520cc7997e01b2a23da875c
WordPress Slider Revolution 4.1.2 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 4.1.2 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | d3b71e6cca26b526cd8c1ef3f9be1a645c838d5b2349fa4c8be240892908d108
WordPress Slider Revolution 3.0.8 Directory Traversal
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin version 3.0.8 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 129c075ad285b288723e5f16312e3c90c87bccd10a3436f09ab9fdb5cfb03d53
Hughes Satellite Router Remote File Inclusion Cross Frame Scripting
Posted Dec 29, 2022
Authored by LiquidWorm | Site zeroscience.mk

Hughes Satellite Router contains a cross-frame scripting via remote file inclusion vulnerability that may potentially be exploited by malicious users to compromise an affected system. This vulnerability may allow an unauthenticated malicious user to misuse frames, include JS/HTML code and steal sensitive information from legitimate users of the application. Affected versions include HX200 8.3.1.14, HX90 6.11.0.5, HX50L 6.10.0.18, HN9460 8.2.0.48, and HN7000S 6.9.0.37.

tags | exploit, remote, file inclusion
SHA-256 | 01732a937c344613efd7c1ef744f546511c874deecd845ef0ca2d232baf0e177
ILIAS eLearning 7.15 Command Injection / XSS / LFI / Open Redirect
Posted Dec 9, 2022
Authored by Anna Hartig, Niklas Schilling, Constantin Schwarz | Site sec-consult.com

ILIAS eLearning versions 7.15 and below suffer from authenticated command injection, persistent cross site scripting, local file inclusion, and open redirection vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
advisories | CVE-2022-45915, CVE-2022-45916, CVE-2022-45917, CVE-2022-45918
SHA-256 | ee31da97db0bda4a3b42019ff3e199e34d24625e0b83fa1d18f2b97da9c2728c
py7zr 0.20.0 Directory Traversal
Posted Dec 7, 2022
Authored by Matteo Cosentino

A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr versions 0.20.0 and earlier allows attackers to read arbitrary files on the local machine via a malicious 7z file extraction.

tags | exploit, arbitrary, local, python, file inclusion
advisories | CVE-2022-44900
SHA-256 | 7aa7ca72652dab91234127d8332a19316f0f61be17e1c626e65aae18d9435347
Page 4 of 171
Back23456Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close