exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32033
The code describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data in the 'CONFIG[pear_dir]' parameter. Exploitation could lead to arbitrary code execution or other attacks.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Network access to the target application
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32035
The code describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data in the 'CONFIG[includes]' parameter. Exploitation could lead to remote code execution by including malicious files from external sources.
Classification
Writeup 80%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to host a malicious file on an external server
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32027
The provided text describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data. It includes a sample exploit URL but lacks executable code.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Network access to the target application
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32026
The provided text describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data. It includes a sample exploit URL but lacks executable code.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Network access to the target application · Ability to host malicious files on an external server
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32030
The provided text describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data. It includes a sample exploit URL but lacks executable code.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Network access to the target application
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32025
The provided text describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data. The example URL demonstrates how an attacker could exploit this by injecting a malicious external URL into the 'CONFIG[pear_dir]' parameter.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to craft a malicious URL
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32024
The code describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data. The example URL demonstrates how an attacker could exploit this by injecting a malicious remote path into the 'CONFIG[pear_dir]' parameter.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to host malicious files on a remote server
exploitdb
WORKING POC
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32028
This exploit demonstrates a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied input in the 'CONFIG[pear_dir]' parameter. An attacker can include arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Network access to the target application · Ability to host a malicious file on a remote server
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32031
The provided text describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data. The example URL demonstrates how an attacker could exploit this by injecting a malicious external URL into the 'CONFIG[pear_dir]' parameter.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to craft a malicious URL
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32032
The provided text describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data. It includes a sample exploit URL but lacks executable code.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Network access to the target application · Ability to craft malicious URLs
exploitdb
WORKING POC
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32029
This exploit demonstrates a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data in the 'CONFIG[pear_dir]' parameter. An attacker can include arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Network access to the target application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32036
This exploit demonstrates a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data in the 'CONFIG[includes]' parameter. An attacker can include and execute arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WRITEUP
VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32034
The code describes a remote file inclusion vulnerability in V-webmail 1.6.4 due to insufficient sanitization of user-supplied data in the 'CONFIG[pear_dir]' parameter. Exploitation could allow an attacker to include remote files, potentially leading to arbitrary code execution.
Classification
Writeup 90%
Target:
V-webmail 1.6.4
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to host a malicious file on a remote server