### [CVE-2011-3611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3611) ![](https://img.shields.io/static/v1?label=Product&message=UseBB&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Local%20File%20Inclusion&color=brighgreen) ### Description A File Inclusion vulnerability exists in act parameter to admin.php in UseBB before 1.0.12. ### POC #### Reference - https://packetstormsecurity.com/files/100103/UseBB-1.0.11-Cross-Site-Request-Forgery-Local-File-Inclusion.html - https://www.immuniweb.com/advisory/HTB22913 #### Github No PoCs found on GitHub currently.