Php Exploits

1,334 exploits tracked across all sources.

Sort: Activity Stars
CVE-2007-1521 EXPLOITDB php VERIFIED
PHP <4.4.7, <5.2.2 - Use After Free
Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation.
by Stefan Esser
CVE-2007-1522 EXPLOITDB php VERIFIED
PHP 5.2.0-5.2.1 - Use After Free
Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.
by Stefan Esser
CVE-2007-1453 EXPLOITDB php VERIFIED
PHP <5.2.0 - RCE
Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.
by Stefan Esser
CVE-2007-1584 EXPLOITDB php VERIFIED
PHP 5.2.0 - RCE
Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string.
by Stefan Esser
CVE-2007-1493 EXPLOITDB php VERIFIED
NukeSentinel <2.5.06 - SQL Injection
nukesentinel.php in NukeSentinel 2.5.06 and earlier uses a permissive regular expression to validate an IP address, which allows remote attackers to execute arbitrary SQL commands via the Client-IP HTTP header, due to an incomplete patch for CVE-2007-1172.
by DarkFig
CVE-2007-1452 EXPLOITDB php VERIFIED
PHP <5.2.0 - XSS
The FDF support (ext/fdf) in PHP 5.2.0 and earlier does not implement the input filtering hooks for ext/filter, which allows remote attackers to bypass web site filters via an application/vnd.fdf formatted POST.
by Stefan Esser
CVE-2007-1413 EXPLOITDB php VERIFIED
Php < 5.2.3 - Memory Corruption
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
by rgod
CVE-2007-1412 EXPLOITDB php VERIFIED
PHP 4.4.6 - Info Disclosure
The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 allows context-dependent attackers to obtain sensitive information (script source code) via a long string in the second argument.
by rgod
CVE-2007-1399 EXPLOITDB CRITICAL php VERIFIED
Php < 1.8.4 - Buffer Overflow
Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.
by Stefan Esser
CVSS 9.8
CVE-2007-1401 EXPLOITDB php VERIFIED
Php - Buffer Overflow
Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.
by rgod
CVE-2007-1382 EXPLOITDB php VERIFIED
PHP COM - RCE
The PHP COM extensions for PHP on Windows systems allow context-dependent attackers to execute arbitrary code via a WScript.Shell COM object, as demonstrated by using the Run method of this object to execute cmd.exe, which bypasses PHP's safe mode.
by anonymous
CVE-2007-1375 EXPLOITDB php VERIFIED
PHP <5.2.1 - Memory Corruption
Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.
by Stefan Esser
CVE-2007-1376 EXPLOITDB php VERIFIED
PHP <4.4.5, <5.2.1 - Memory Corruption
The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.
by Stefan Esser
CVE-2007-1376 EXPLOITDB php VERIFIED
PHP <4.4.5, <5.2.1 - Memory Corruption
The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.
by Stefan Esser
CVE-2007-1411 EXPLOITDB php VERIFIED
Php < 4.4.6 - Buffer Overflow
Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.
by rgod
CVE-2007-1293 EXPLOITDB php VERIFIED
Rigter Portal System 6.2 - SQL Injection
SQL injection vulnerability in Rigter Portal System (RPS) 6.2, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the categoria parameter to the top-level URI (index.php), possibly related to ver_descarga.php.
by s0cratex
CVE-2007-0908 EXPLOITDB php VERIFIED
PHP <5.2.1 & <4.4.5 - Info Disclosure
The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.
by Stefan Esser
CVE-2007-1380 EXPLOITDB php VERIFIED
PHP <4.4.5, <5.2.1 - Info Disclosure
The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.
by Stefan Esser
CVE-2007-1381 EXPLOITDB php VERIFIED
Php - Memory Corruption
The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.
by Stefan Esser
EIP-2026-113365 EXPLOITDB php VERIFIED
webSPELL 4.01.02 - PHP Remote Code Execution
by DarkFig
CVE-2007-1286 EXPLOITDB php VERIFIED
PHP <4.4.4 - RCE
Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.
by Stefan Esser
CVE-2006-6912 EXPLOITDB php VERIFIED
Phpmyfaq < 1.6.7 - SQL Injection
SQL injection vulnerability in phpMyFAQ 1.6.7 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the userfile or filename parameter.
by elgCrew
CVE-2007-1383 EXPLOITDB CRITICAL php VERIFIED
Php - Integer Overflow
Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.
by Stefan Esser
CVSS 9.8
CVE-2007-1292 EXPLOITDB php VERIFIED
Jelsoft vBulletin <3.5.8-3.6.5 - SQL Injection
SQL injection vulnerability in inlinemod.php in Jelsoft vBulletin before 3.5.8, and before 3.6.5 in the 3.6.x series, might allow remote authenticated users to execute arbitrary SQL commands via the postids parameter. NOTE: the vendor states that the attack is feasible only in circumstances "almost impossible to achieve."
by rgod
CVE-2007-1233 EXPLOITDB php VERIFIED
STWC-Counter <3.4.0.0 - RCE
PHP remote file inclusion vulnerability in downloadcounter.php in STWC-Counter 3.4.0.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the stwc_counter_verzeichniss parameter.
by burncycle