Exploitdb Exploits

1,269 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-105680 EXPLOITDB php VERIFIED
Cacti 0.8.6i - 'copy_cacti_user.php' SQL Injection Create Admin
by rgod
CVE-2006-6853 EXPLOITDB php VERIFIED
Durian Web App Server 3.02 - RCE
Buffer overflow in Durian Web Application Server 3.02 freeware on Windows allows remote attackers to execute arbitrary code via a long string in a crafted packet to TCP port 4002.
by rgod
CVE-2006-6853 EXPLOITDB php VERIFIED
Durian Web App Server 3.02 - RCE
Buffer overflow in Durian Web Application Server 3.02 freeware on Windows allows remote attackers to execute arbitrary code via a long string in a crafted packet to TCP port 4002.
by rgod
CVE-2006-6856 EXPLOITDB php VERIFIED
WebText CMS <0.4.5.2 - Code Injection
Direct static code injection vulnerability in WebText CMS 0.4.5.2 and earlier allows remote attackers to inject arbitrary PHP code into a script in wt/users/ via the im parameter during a profile edit (edycja) operation, which is then executed via a direct request for this script.
by Kacper
CVE-2006-6799 EXPLOITDB php VERIFIED
Cacti <0.8.6i - SQL Injection
SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.
by rgod
CVE-2006-6879 EXPLOITDB php VERIFIED
PHP-Update <2.7 - RCE
Unrestricted file upload vulnerability in admin/uploads.php in PHP-Update 2.7 and earlier allows remote authenticated users to upload arbitrary PHP scripts to the gfx/ and files/ directories via the userfile parameter.
by rgod
CVE-2006-6880 EXPLOITDB php VERIFIED
PHP-Update <2.7 - SQL Injection
Multiple SQL injection vulnerabilities in code/guestadd.php in PHP-Update 2.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) newmessage, (2) newname, (3) newwebsite, or (4) newemail parameter.
by rgod
CVE-2006-6849 EXPLOITDB php VERIFIED
Cahier de texte (CDT) 2.2 - Privilege Escalation
administration/index.php in Cahier de texte (CDT) 2.2 does not properly exit when authentication fails, which allows remote attackers to perform unauthorized administrative actions.
by DarkFig
CVE-2006-6780 EXPLOITDB php VERIFIED
HLstats <1.34 - SQL Injection
SQL injection vulnerability in the login form in HLstats 1.20 through 1.34 allows remote attackers to execute arbitrary SQL commands via the killLimit parameter.
by Michael Brooks
CVE-2006-6781 EXPLOITDB php VERIFIED
HLstats <1.34 - Info Disclosure
HLstats 1.20 through 1.34 allows remote attackers to obtain sensitive information via playinfo mode, with certain values of the player and playerdata[lastName][] parameters, which reveals the path in an error message.
by Michael Brooks
CVE-2006-6785 EXPLOITDB php VERIFIED
Open Newsletter <2.5 - RCE
The (1) settings.php and (2) subscribers.php scripts in Open Newsletter 2.5 and earlier do not exit when authentication fails, which allows remote attackers to perform unauthorized administrative actions, or execute arbitrary code in conjunction with another vulnerability.
by BlackHawk
CVE-2006-6786 EXPLOITDB php VERIFIED
Open Newsletter <2.5 - Command Injection
Open Newsletter 2.5 and earlier allows remote authenticated administrators to execute arbitrary PHP code by inserting the code into the email parameter to (1) subscribe.php or (2) unsubscribe.php.
by BlackHawk
CVE-2006-1209 EXPLOITDB php VERIFIED
PHP Advanced Transfer Manager <1.31 - Info Disclosure
PHP Advanced Transfer Manager 1.00 through 1.30 stores sensitive information, including password hashes, under the web root with insufficient access control, which allows remote attackers to download each password hash via a direct request for a users/[USERNAME] file.
by Kacper
CVE-2006-6661 EXPLOITDB php VERIFIED
PHP-Update <2.7 - RCE
Variable overwrite vulnerability in blog.php in PHP-Update 2.7 and earlier allows remote attackers to overwrite arbitrary program variables and execute arbitrary PHP code via multiple vectors that use the extract function, as demonstrated by the (1) f, (2) newmessage, (3) newusername, (4) adminuser, and (5) permission parameters.
by rgod
EIP-2026-106981 EXPLOITDB php VERIFIED
extreme-fusion 4.02 - Remote Code Execution
by Kacper
EIP-2026-106980 EXPLOITDB php VERIFIED
eXtreme-fusion 4.02 - 'Fusion_Forum_View.php' Local File Inclusion
by Kacper
CVE-2006-6624 EXPLOITDB php VERIFIED
Sambar Server 6.4 - DoS
The FTP Server in Sambar Server 6.4 allows remote authenticated users to cause a denial of service (application crash) via a long series of "./" sequences in the SIZE command.
by rgod
EIP-2026-115333 EXPLOITDB php VERIFIED
Golden FTP server 1.92 - 'USER/PASS' Heap Overflow (PoC)
by rgod
CVE-2006-6565 EXPLOITDB php VERIFIED
FileZilla Server <0.9.22 - DoS
FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a wildcard argument to the (1) LIST or (2) NLST commands, which results in a NULL pointer dereference, a different set of vectors than CVE-2006-6564. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.
by shinnai
CVE-2006-6613 EXPLOITDB php VERIFIED
phpAlbum <0.4.1 Beta 6 - Path Traversal
Directory traversal vulnerability in language.php in phpAlbum 0.4.1 Beta 6 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files or obtain sensitive information via a .. (dot dot) in the pa_lang[include_file] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
by Kacper
CVE-2006-6564 EXPLOITDB php VERIFIED
FileZilla Server <0.9.22 - DoS
FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a malformed argument to the STOR command, which results in a NULL pointer dereference. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.
by rgod
CVE-2006-6445 EXPLOITDB php VERIFIED
Envolution 1.1.0 - Path Traversal
Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
by Kacper
EIP-2026-113462 EXPLOITDB php VERIFIED
Woltlab Burning Board 2.3.x - 'register.php' Cross-Site Scripting
by blueshisha
CVE-2006-6242 EXPLOITDB php VERIFIED
S9Y Serendipity - Path Traversal
Multiple directory traversal vulnerabilities in Serendipity 1.0.3 and earlier allow remote attackers to read or include arbitrary local files via a .. (dot dot) sequence in the serendipity[charset] parameter in (1) include/lang.inc.php; or to plugins/ scripts (2) serendipity_event_bbcode/serendipity_event_bbcode.php, (3) serendipity_event_browsercompatibility/serendipity_event_browsercompatibility.php, (4) serendipity_event_contentrewrite/serendipity_event_contentrewrite.php, (5) serendipity_event_creativecommons/serendipity_event_creativecommons.php, (6) serendipity_event_emoticate/serendipity_event_emoticate.php, (7) serendipity_event_entryproperties/serendipity_event_entryproperties.php, (8) serendipity_event_karma/serendipity_event_karma.php, (9) serendipity_event_livesearch/serendipity_event_livesearch.php, (10) serendipity_event_mailer/serendipity_event_mailer.php, (11) serendipity_event_nl2br/serendipity_event_nl2br.php, (12) serendipity_event_s9ymarkup/serendipity_event_s9ymarkup.php, (13) serendipity_event_searchhighlight/serendipity_event_searchhighlight.php, (14) serendipity_event_spamblock/serendipity_event_spamblock.php, (15) serendipity_event_spartacus/serendipity_event_spartacus.php, (16) serendipity_event_statistics/serendipity_plugin_statistics.php, (17) serendipity_event_templatechooser/serendipity_event_templatechooser.php, (18) serendipity_event_textile/serendipity_event_textile.php, (19) serendipity_event_textwiki/serendipity_event_textwiki.php, (20) serendipity_event_trackexits/serendipity_event_trackexits.php, (21) serendipity_event_weblogping/serendipity_event_weblogping.php, (22) serendipity_event_xhtmlcleanup/serendipity_event_xhtmlcleanup.php, (23) serendipity_plugin_comments/serendipity_plugin_comments.php, (24) serendipity_plugin_creativecommons/serendipity_plugin_creativecommons.php, (25) serendipity_plugin_entrylinks/serendipity_plugin_entrylinks.php, (26) serendipity_plugin_eventwrapper/serendipity_plugin_eventwrapper.php, (27) serendipity_plugin_history/serendipity_plugin_history.php, (28) serendipity_plugin_recententries/serendipity_plugin_recententries.php, (29) serendipity_plugin_remoterss/serendipity_plugin_remoterss.php, (30) serendipity_plugin_shoutbox/serendipity_plugin_shoutbox.php, and and (31) serendipity_plugin_templatedropdown/serendipity_plugin_templatedropdown.php.
by Kacper
CVE-2006-6966 EXPLOITDB php VERIFIED
phpGraphy <0.9.13a - RCE
phpGraphy before 0.9.13a does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary PHP code by uploading a config.php file via the pictures[] parameter to index.php. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpGraphy.
by rgod