Php Exploits

1,334 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-104658 EXPLOITDB php
PHP 5.3.10 - 'spl_autoload_call()' Local Denial of Service
by Yakir Wizman
EIP-2026-104657 EXPLOITDB php
PHP 5.3.10 - 'spl_autoload()' Local Denial of Service
by Yakir Wizman
EIP-2026-115552 EXPLOITDB php VERIFIED
LibreOffice 3.5.3 - '.rtf' FileOpen Crash
by shinnai
EIP-2026-112224 EXPLOITDB php VERIFIED
Small-Cms - 'hostname' Remote PHP Code Injection
by L3b-r1'z
EIP-2026-115012 EXPLOITDB php VERIFIED
bsnes 0.87 - Local Denial of Service
by Yakir Wizman
EIP-2026-112491 EXPLOITDB php VERIFIED
Supernews 2.6.1 - SQL Injection
by WhiteCollarGroup
EIP-2026-104663 EXPLOITDB php VERIFIED
PHP 5.4.3 - wddx_serialize_* / stream_bucket_* Variant Object Null Ptr Dereference
by condis
EIP-2026-104662 EXPLOITDB php VERIFIED
PHP 5.4.3 - 'com_event_sink' Denial of Service
by condis
CVE-2012-2376 EXPLOITDB php VERIFIED
PHP <5.4.3 - RCE
Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.
by 0in
CVE-2012-2052 EXPLOITDB php VERIFIED
Adobe Photoshop Cs5 - Memory Corruption
Stack-based buffer overflow in the U3D.8BI library plugin in Adobe Photoshop CS5 12.x before 12.0.5 and CS5.1 12.1.x before 12.1.1 allows remote attackers to execute arbitrary code via a long Collada asset element in a DAE file, as demonstrated by the cameraYFov value in the contributor comments element.
by rgod
CVE-2012-1002 EXPLOITDB php VERIFIED
OpenConf <4.12 - SQL Injection
SQL injection vulnerability in author/edit.php in OpenConf 4.x before 4.12 allows remote attackers to execute arbitrary SQL commands via the pid parameter.
by EgiX
EIP-2026-109805 EXPLOITDB php VERIFIED
MySQLDumper 1.24.4 - 'menu.php' PHP Remote Code Execution
by AkaStep
CVE-2012-1495 EXPLOITDB CRITICAL php VERIFIED
Webcalendar < 1.2.5 - Injection
install/index.php in WebCalendar before 1.2.5 allows remote attackers to execute arbitrary code via the form_single_user_login parameter.
by EgiX
CVSS 9.8
CVE-2012-1496 EXPLOITDB HIGH php VERIFIED
Webcalendar < 1.2.5 - Injection
Local file inclusion in WebCalendar before 1.2.5.
by EgiX
CVSS 8.8
EIP-2026-103534 EXPLOITDB php
LibreOffice 3.5.2.2 - Memory Corruption
by shinnai
EIP-2026-109897 EXPLOITDB php VERIFIED
NetworX CMS - Cross-Site Request Forgery (Add Admin)
by N3t.Crack3r
CVE-2012-1300 EXPLOITDB php
PHPFox 3.0.1 - 'ajax.php' Remote Command Execution
by EgiX
EIP-2026-114557 EXPLOITDB php VERIFIED
YVS Image Gallery - SQL Injection
by CorryL
EIP-2026-106224 EXPLOITDB php
cPassMan 1.82 - Remote Command Execution
by ls
CVE-2012-0830 EXPLOITDB php VERIFIED
PHP <5.3.9 - RCE
The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.
by Stefan Esser
CVE-2012-1125 EXPLOITDB php
Kish Guest Posting <1.2 - RCE
Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin before 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the directory specified by the folder parameter.
by EgiX
CVE-2012-5318 EXPLOITDB php
Kish Guest Posting plugin 1.2 - RCE
Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a double extension, then accessing it via a direct request to the file in the directory specified by the folder parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1125.
by EgiX
CVE-2012-1153 EXPLOITDB php
Apprain < 0.1.5 - Unrestricted File Upload
Unrestricted file upload vulnerability in addons/uploadify/uploadify.php in appRain CMF 0.1.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the uploads directory.
by EgiX
EIP-2026-113722 EXPLOITDB php VERIFIED
WordPress Plugin Evarisk - 'uploadPhotoApres.php' Arbitrary File Upload
by Sammy FORGIT
CVE-2011-5148 EXPLOITDB php
Joomla! mod_simplefileuploadv1.3 <1.3.5 - RCE
Multiple incomplete blacklist vulnerabilities in the Simple File Upload (mod_simplefileuploadv1.3) module before 1.3.5 for Joomla! allow remote attackers to execute arbitrary code by uploading a file with a (1) php5, (2) php6, or (3) double (e.g. .php.jpg) extension, then accessing it via a direct request to the file in images/, as exploited in the wild in January 2012.
by gmda