Gammarays

7 exploits Active since Apr 2007
CVE-2007-2092 EXPLOITDB WRITEUP
Limesoft Guestbook - Code Injection
Direct static code injection vulnerability in index.php in Limesoft Guestbook (LS Simple Guestbook) allows remote attackers to inject arbitrary PHP code into posts.txt via the name parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVE-2007-2147 EXPLOITDB php WORKING POC
WiredPHP Chatness <2.5.3 - Info Disclosure
admin/options.php in Stephen Craton (aka WiredPHP) Chatness 2.5.3 and earlier does not check for administrative credentials, which allows remote attackers to read and modify the classes/vars.php and classes/varstuff.php configuration files via direct requests.
CVE-2007-2148 EXPLOITDB php WORKING POC
Chatness <2.5.3 - Code Injection
Direct static code injection vulnerability in admin/save.php in Stephen Craton (aka WiredPHP) Chatness 2.5.3 and earlier allows remote authenticated administrators to inject PHP code into .html files via the html parameter, as demonstrated by head.html and foot.html, which are included and executed upon a direct request for index.php. NOTE: a separate vulnerability could be leveraged to make this issue exploitable by remote unauthenticated attackers.
CVE-2007-2141 EXPLOITDB php WORKING POC
ShoutPro 1.5.2 - Code Injection
Direct static code injection vulnerability in shoutbox.php in ShoutPro 1.5.2 allows remote attackers to inject arbitrary PHP code into shouts.php via the shout parameter.
CVE-2007-2093 EXPLOITDB text WORKING POC
Limesoft Guestbook 1.0 - Code Injection
Direct static code injection vulnerability in index.php in Limesoft Guestbook (LS Simple Guestbook) 1.0 allows remote attackers to inject arbitrary PHP code into posts.txt via the message parameter.
EIP-2026-106657 EXPLOITDB perl WORKING POC
e107 0.7.8 - 'mailout.php' (Authenticated) Access Escalation
CVE-2007-2149 EXPLOITDB php WORKING POC
Chatness <2.5.3 - Privilege Escalation
Stephen Craton (aka WiredPHP) Chatness 2.5.3 and earlier stores usernames and unencrypted passwords in (1) classes/vars.php and (2) classes/varstuff.php, and recommends 0666 or 0777 permissions for these files, which allows local users to gain privileges by reading the files, and allows remote attackers to obtain credentials via a direct request for admin/options.php.