Exploitdb Exploits

2,814 exploits tracked across all sources.

Sort: Activity Stars
CVE-2006-6756 EXPLOITDB perl VERIFIED
Ixprim 1.2 - Info Disclosure
The code function in install.fct.php in Ixprim 1.2 produces a guessable value of the confidential IXP_CODE in mainfile.php, which might allow remote attackers to gain access to the administration panel via a brute force attack.
by DarkFig
CVE-2006-6738 EXPLOITDB perl VERIFIED
cwmCounter <5.1.1 - Code Injection
PHP remote file inclusion vulnerability in statistic.php in cwmCounter 5.1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path parameter.
by bd0rk
CVE-2006-6719 EXPLOITDB perl VERIFIED
GNU Wget 1.10.2 - DoS
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
by Federico L. Bossi Bonin
EIP-2026-103120 EXPLOITDB perl VERIFIED
GNU InetUtils ftpd 1.4.2 - 'ld.so.preload' Remote Code Execution
by kingcope
CVE-2006-6575 EXPLOITDB perl VERIFIED
Brian Drawert Yaplap <0.6-0.6.1 - RCE
PHP remote file inclusion vulnerability in ldap.php in Brian Drawert Yet Another PHP LDAP Admin Project (yaplap) 0.6 and 0.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the LOGIN_style parameter.
by DeltahackingTEAM
EIP-2026-114364 EXPLOITDB perl VERIFIED
Work System eCommerce 3.0.3/3.0.4 - 'forum.php' Remote File Inclusion
by the_Edit0r
CVE-2006-6553 EXPLOITDB perl VERIFIED
NewsSuite 1.03 - RCE
PHP remote file inclusion vulnerability in includes/newssuite_constants.php in the NewsSuite 1.03 module for mxBB allows remote attackers to execute arbitrary PHP code via a URL in the mx_root_path parameter.
by 3l3ctric-Cracker
CVE-2006-6615 EXPLOITDB perl VERIFIED
mxBB 0.92 - RCE
PHP remote file inclusion vulnerability in includes/act_constants.php in the Activity Games (mx_act) 0.92 module for mxBB allows remote attackers to execute arbitrary PHP code via a URL in the module_root_path parameter.
by 3l3ctric-Cracker
CVE-2006-6598 EXPLOITDB perl VERIFIED
TorrentFlux <2.2 - Path Traversal
Directory traversal vulnerability in viewnfo.php in (1) TorrentFlux before 2.2 and (2) torrentflux-b4rt before 2.1-b4rt-972 allows remote authenticated users to read arbitrary files via .. (dot dot) sequences in the path parameter, a different vector than CVE-2006-6328.
by r0ut3r
CVE-2006-6599 EXPLOITDB perl VERIFIED
TorrentFlux 2.2 - Command Injection
maketorrent.php in TorrentFlux 2.2 allows remote authenticated users to execute arbitrary commands via shell metacharacters (";" semicolon) in the announce parameter.
by r0ut3r
CVE-2006-6604 EXPLOITDB perl VERIFIED
TorrentFlux 2.2 - Path Traversal
Directory traversal vulnerability in downloaddetails.php in TorrentFlux 2.2 allows remote authenticated users to read arbitrary files via .. (dot dot) sequences in the alias parameter, a different vector than CVE-2006-6328.
by r0ut3r
CVE-2006-6542 EXPLOITDB perl VERIFIED
Fantastic News <2.1.4 - SQL Injection
SQL injection vulnerability in news.php in Fantastic News 2.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
by Bl0od3r
CVE-2006-6453 EXPLOITDB perl VERIFIED
J-OWAMP Web Interface 2.1 - RCE
PHP remote file inclusion vulnerability in JOWAMP_ShowPage.php in J-OWAMP Web Interface 2.1 allows remote authenticated users to execute arbitrary PHP code via a URL in the link parameter.
by 3l3ctric-Cracker
CVE-2006-6184 EXPLOITDB perl VERIFIED
Alliedtelesyn At-tftp < 1.9 - Buffer Overflow
Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
by Jacopo Cervini
CVE-2006-6390 EXPLOITDB perl VERIFIED
Open Solution Quick.Cart 2.0 - Path Traversal
Multiple directory traversal vulnerabilities in Open Solution Quick.Cart 2.0, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the config[db_type] parameter to (1) categories.php, (2) couriers.php, (3) orders.php, and (4) products.php in actions_admin/; and (5) orders.php and (6) products.php in actions_client/; as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by one of these PHP scripts.
by r0ut3r
CVE-2006-6652 EXPLOITDB perl VERIFIED
NetBSD-current <20050914 - NetBSD libc - RCE
Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion.
by kcope
CVE-2006-6652 EXPLOITDB perl VERIFIED
NetBSD-current <20050914 - NetBSD libc - RCE
Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion.
by kingcope
CVE-2006-5177 EXPLOITDB perl VERIFIED
MailEnable Professional/E 2.0 - RCE/DoS
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
by mu-b
CVE-2006-6202 EXPLOITDB perl VERIFIED
PHP-Nuke <0.0.3 - RCE
PHP remote file inclusion vulnerability in modules/NukeAI/util.php in the NukeAI 0.0.3 Beta module for PHP-Nuke, aka Program E is an AIML chatterbot, allows remote attackers to execute arbitrary PHP code via a URL in the AIbasedir parameter.
by DeltahackingTEAM
CVE-2006-6255 EXPLOITDB perl VERIFIED
NukeAI 0.0.3 Beta - Code Injection
Direct static code injection vulnerability in util.php in the NukeAI 0.0.3 Beta module for PHP-Nuke, aka Program E is an AIML chatterbot, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension in the filename parameter and code in the moreinfo parameter, which is saved to a filename under descriptions/, which is accessible via a direct request.
by DeltahackingTEAM
CVE-2006-6254 EXPLOITDB perl VERIFIED
Cahier DE Textes < 2.2 - Path Traversal
administration/telecharger.php in Cahier de texte 2.0 allows remote attackers to obtain unparsed content (source code) of files via the chemin parameter, as demonstrated using directory traversal sequences to obtain the MySQL username and password from conn_cahier_de_texte.php. NOTE: it is not clear whether the scope of this issue extends above the web document root, and whether directory traversal is the primary vulnerability.
by DarkFig
CVE-2006-6115 EXPLOITDB perl VERIFIED
Fipsasp Fipscms < 4.5 - SQL Injection
SQL injection vulnerability in index.asp in fipsCMS 4.5 and earlier allows remote attackers to execute arbitrary SQL commands via the fid parameter.
by ajann
CVE-2006-6157 EXPLOITDB perl VERIFIED
Michaelis Freunde Contentnow < 1.39 - SQL Injection
SQL injection vulnerability in index.php in ContentNow 1.39 and earlier allows remote attackers to execute arbitrary SQL commands via the pageid parameter. NOTE: this issue can be leveraged for path disclosure with an invalid pageid parameter.
by Revenge
EIP-2026-110689 EXPLOITDB perl VERIFIED
PHP Easy Downloader 1.5 - 'save.php' Remote Code Execution
by nuffsaid
CVE-2006-6051 EXPLOITDB perl VERIFIED
Mambo/Joomla! - RCE
PHP remote file inclusion vulnerability in reporter.logic.php in the MosReporter (com_reporter) component for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
by Crackers_Child