Php Exploits

1,334 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-106153 EXPLOITDB php VERIFIED
Contrexx ShopSystem 2.2 SP3 - Blind SQL Injection
by Penguin
EIP-2026-113704 EXPLOITDB php VERIFIED
WordPress Plugin E-Commerce 3.8.4 - SQL Injection
by IHTeam
EIP-2026-105799 EXPLOITDB php
cFTP 0.1 - 'r80' Arbitrary File Upload
by leviathan
EIP-2026-102467 EXPLOITDB php VERIFIED
CA ARCserve D2D r15 GWT RPC - Multiple Vulnerabilities
by rgod
EIP-2026-106976 EXPLOITDB php
ExtCalendar2 - Cookie Authentication Bypass / Backdoor Upload
by Lagripe-Dz
CVE-2011-2505 EXPLOITDB php VERIFIED
Phpmyadmin < 3.3.10.2 - Code Injection
libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."
by Mango
CVE-2011-2506 EXPLOITDB php VERIFIED
Phpmyadmin < 3.3.10.2 - Code Injection
setup/lib/ConfigGenerator.class.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly restrict the presence of comment closing delimiters, which allows remote attackers to conduct static code injection attacks by leveraging the ability to modify the SESSION superglobal array.
by Mango
CVE-2011-10011 EXPLOITDB CRITICAL php VERIFIED
WeBid 1.0.2 - Code Injection
WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
by EgiX
CVE-2011-1938 EXPLOITDB php VERIFIED
PHP <5.3.7 - Buffer Overflow
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
by Jonathan Salwan
EIP-2026-103867 EXPLOITDB php VERIFIED
Atlassian JIRA 3.13.5 - File Download Security Bypass
by Ignacio Garrido
EIP-2026-109745 EXPLOITDB php VERIFIED
MyBloggie 2.1.6 - HTML Injection / SQL Injection
by Robin Verton
EIP-2026-110875 EXPLOITDB php VERIFIED
PHP-Nuke 8.3 - 'upload.php' Arbitrary File Upload (1)
by pentesters.ir
EIP-2026-113167 EXPLOITDB php
w-Agora Forum 4.2.1 - Arbitrary File Upload
by Treasure Priyamal
EIP-2026-106698 EXPLOITDB php
Easy Media Script - SQL Injection
by Lagripe-Dz
CVE-2011-1938 EXPLOITDB php VERIFIED
PHP <5.3.7 - Buffer Overflow
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
by Marek Kroemeke
CVE-2011-1939 EXPLOITDB CRITICAL php VERIFIED
Zend Framework <1.10.9, <1.11.6 - SQL Injection
SQL injection vulnerability in Zend Framework 1.10.x before 1.10.9 and 1.11.x before 1.11.6 when using non-ASCII-compatible encodings in conjunction PDO_MySql in PHP before 5.3.6.
by Anthony Ferrara
CVSS 9.8
EIP-2026-110372 EXPLOITDB php
osCommerce 2.3.1 - 'banner_manager.php' Arbitrary File Upload
by Number 7
CVE-2011-0419 EXPLOITDB php VERIFIED
Apache Portable Runtime < 1.4.3 - Resource Allocation Without Limits
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
by Maksymilian Arciemowicz
EIP-2026-114033 EXPLOITDB php
WordPress Plugin SermonBrowser 0.43 - SQL Injection
by Ma3sTr0-Dz
EIP-2026-114032 EXPLOITDB php VERIFIED
WordPress Plugin Sermon Browser 0.43 - Cross-Site Scripting / SQL Injection
by Ma3sTr0-Dz
CVE-2012-2386 EXPLOITDB php
PHP <5.3.14, <5.4.4 - Buffer Overflow
Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow.
by Alexander Gavrun
CVE-2011-1092 EXPLOITDB php VERIFIED
Php < 5.3.5 - Numeric Error
Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
by Jose Carlos Norte
CVE-2011-1471 EXPLOITDB php VERIFIED
PHP <5.3.6 - DoS
Integer signedness error in zip_stream.c in the Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive file that triggers errors in zip_fread function calls.
by TorokAlpar
CVE-2011-1470 EXPLOITDB php VERIFIED
PHP <5.3.6 - DoS
The Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a ziparchive stream that is not properly handled by the stream_get_contents function.
by paulgao
EIP-2026-109263 EXPLOITDB php VERIFIED
Maian Weblog 4.0 - Blind SQL Injection
by mr_me