Exploitdb Exploits

1,269 exploits tracked across all sources.

Sort: Activity Stars
CVE-2007-1293 EXPLOITDB php VERIFIED
Rigter Portal System 6.2 - SQL Injection
SQL injection vulnerability in Rigter Portal System (RPS) 6.2, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the categoria parameter to the top-level URI (index.php), possibly related to ver_descarga.php.
by s0cratex
CVE-2007-0908 EXPLOITDB php VERIFIED
PHP <5.2.1 & <4.4.5 - Info Disclosure
The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.
by Stefan Esser
CVE-2007-1380 EXPLOITDB php VERIFIED
PHP <4.4.5, <5.2.1 - Info Disclosure
The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.
by Stefan Esser
CVE-2007-1381 EXPLOITDB php VERIFIED
Php - Memory Corruption
The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.
by Stefan Esser
EIP-2026-113365 EXPLOITDB php VERIFIED
webSPELL 4.01.02 - PHP Remote Code Execution
by DarkFig
CVE-2007-1286 EXPLOITDB php VERIFIED
PHP <4.4.4 - RCE
Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.
by Stefan Esser
CVE-2006-6912 EXPLOITDB php VERIFIED
Phpmyfaq < 1.6.7 - SQL Injection
SQL injection vulnerability in phpMyFAQ 1.6.7 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the userfile or filename parameter.
by elgCrew
CVE-2007-1383 EXPLOITDB CRITICAL php VERIFIED
Php - Integer Overflow
Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.
by Stefan Esser
CVSS 9.8
CVE-2007-1292 EXPLOITDB php VERIFIED
Jelsoft vBulletin <3.5.8-3.6.5 - SQL Injection
SQL injection vulnerability in inlinemod.php in Jelsoft vBulletin before 3.5.8, and before 3.6.5 in the 3.6.x series, might allow remote authenticated users to execute arbitrary SQL commands via the postids parameter. NOTE: the vendor states that the attack is feasible only in circumstances "almost impossible to achieve."
by rgod
CVE-2007-1233 EXPLOITDB php VERIFIED
STWC-Counter <3.4.0.0 - RCE
PHP remote file inclusion vulnerability in downloadcounter.php in STWC-Counter 3.4.0.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the stwc_counter_verzeichniss parameter.
by burncycle
CVE-2007-1108 EXPLOITDB php VERIFIED
CS-Gallery <2.0 - RCE
PHP remote file inclusion vulnerability in index.php in Christian Schneider CS-Gallery 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the album parameter during a securealbum todo action.
by burncycle
CVE-2007-1107 EXPLOITDB php VERIFIED
Coppermine Photo Gallery <1.4 - SQL Injection
SQL injection vulnerability in thumbnails.php in Coppermine Photo Gallery (CPG) 1.3.x allows remote authenticated users to execute arbitrary SQL commands via a cpg131_fav cookie. NOTE: it was later reported that 1.4.10, 1.4.14, and other 1.4.x versions are also affected using similar cookies.
by s0cratex
CVE-2007-1254 EXPLOITDB php VERIFIED
Connectix Boards <0.7 - SQL Injection
SQL injection vulnerability in part.userprofile.php in Connectix Boards 0.7 and earlier allows remote authenticated users to execute arbitrary SQL commands and obtain privileges via the p_skin parameter to index.php.
by DarkFig
CVE-2007-1166 EXPLOITDB php VERIFIED
Nabopoll 1.2 - SQL Injection
SQL injection vulnerability in result.php in Nabopoll 1.2 allows remote attackers to execute arbitrary SQL commands via the surv parameter.
by s0cratex
CVE-2007-1141 EXPLOITDB php VERIFIED
Magic News Plus 1.0.2 - RCE
PHP remote file inclusion vulnerability in preview.php in Magic News Plus 1.0.2 allows remote attackers to execute arbitrary PHP code via a URL in the php_script_path parameter. NOTE: This issue may overlap CVE-2006-0723.
by HACKERS PAL
CVE-2007-1255 EXPLOITDB php VERIFIED
Connectix Boards <0.7 - RCE
Unrestricted file upload vulnerability in admin.bbcode.php in Connectix Boards 0.7 and earlier allows remote authenticated administrators to execute arbitrary PHP code by uploading a crafted GIF smiley image with a .php extension via the uploadimage parameter to admin.php, which can be later accessed via a direct request for the file in smileys/. NOTE: this can be leveraged with a separate SQL injection issue for remote unauthenticated attacks.
by DarkFig
CVE-2007-1172 EXPLOITDB php VERIFIED
NukeSentinel <2.5.05 - SQL Injection
SQL injection vulnerability in nukesentinel.php in NukeSentinel 2.5.05, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the Client-IP HTTP header, aka the "File Disclosure Exploit."
by DarkFig
CVE-2007-1171 EXPLOITDB php VERIFIED
NukeSentinel <2.5.12 - SQL Injection
SQL injection vulnerability in includes/nsbypass.php in NukeSentinel 2.5.05, 2.5.11, and other versions before 2.5.12 allows remote attackers to execute arbitrary SQL commands via an admin cookie.
by DarkFig
CVE-2007-1493 EXPLOITDB php VERIFIED
NukeSentinel <2.5.06 - SQL Injection
nukesentinel.php in NukeSentinel 2.5.06 and earlier uses a permissive regular expression to validate an IP address, which allows remote attackers to execute arbitrary SQL commands via the Client-IP HTTP header, due to an incomplete patch for CVE-2007-1172.
by DarkFig
CVE-2007-5125 EXPLOITDB php VERIFIED
Rejected
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-1171. Reason: This candidate is a duplicate of CVE-2007-1171. Notes: All CVE users should reference CVE-2007-1171 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
by DarkFig
CVE-2007-0972 EXPLOITDB php VERIFIED
Jupiter CMS 1.1.5 - File Upload
Unrestricted file upload vulnerability in modules/emoticons.php in Jupiter CMS 1.1.5 allows remote attackers to upload arbitrary files by modifying the HTTP request to send an image content type, and to omit is_guest and is_user parameters. NOTE: this issue might be related to CVE-2006-4875.
by DarkFig
CVE-2007-0971 EXPLOITDB php VERIFIED
Jupiter CMS 1.1.5 - SQL Injection
Multiple SQL injection vulnerabilities in Jupiter CMS 1.1.5 allow remote attackers to execute arbitrary SQL commands via the Client-IP HTTP header and certain other HTTP headers, which set the ip variable that is used in SQL queries performed by index.php and certain other PHP scripts. NOTE: the attack vector might involve _SERVER.
by DarkFig
CVE-2007-0871 EXPLOITDB php VERIFIED
eXtremePow - Code Injection
Unrestricted file upload vulnerability in eXtremePow eXtreme File Hosting allows remote attackers to upload arbitrary PHP code via a filename with a double extension such as (1) .rar.php or (2) .zip.php.
by hamed bazargani
CVE-2007-0911 EXPLOITDB php VERIFIED
PHP 5.2.1 - DoS
Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash).
by Thomas Hruska
CVE-2007-0804 EXPLOITDB php VERIFIED
GGCMS <1.1.0 RC1 - Path Traversal
Directory traversal vulnerability in admin/subpages.php in GGCMS 1.1.0 RC1 and earlier allows remote attackers to inject arbitrary PHP code into arbitrary files via ".." sequences in the subpageName parameter, as demonstrated by injecting PHP code into a template file.
by Kacper