Php Exploits

1,334 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-106662 EXPLOITDB php VERIFIED
e107 < 0.75 - GLOBALS Overwrite Remote Code Execution
by rgod
EIP-2026-108027 EXPLOITDB php VERIFIED
iziContents RC6 - Remote Code Execution
by Kacper
CVE-2006-4536 EXPLOITDB php VERIFIED
Cms Frogss - SQL Injection
SQL injection vulnerability in module/rejestracja.php in CMS Frogss 0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the podpis parameter.
by Kacper
CVE-2006-4420 EXPLOITDB php VERIFIED
Phaos - Path Traversal
Directory traversal vulnerability in include_lang.php in Phaos 0.9.2 allows remote attackers to include arbitrary local files via ".." sequences in the lang parameter.
by Kacper
EIP-2026-109423 EXPLOITDB php VERIFIED
MercuryBoard 1.1.4 - 'User-Agent' SQL Injection
by rgod
EIP-2026-112109 EXPLOITDB php VERIFIED
Simple Machines Forum (SMF) 1.1 rc2 - Lock Topics
by rgod
EIP-2026-112108 EXPLOITDB php VERIFIED
Simple Machines Forum (SMF) 1.1 rc2 (Windows) - 'lngfile' Local File Inclusion
by rgod
EIP-2026-108832 EXPLOITDB php VERIFIED
Joomla! Component Poll 1.0.10 - Arbitrary Add Votes
by trueend5
CVE-2006-4267 EXPLOITDB php VERIFIED
Devellion Cubecart - SQL Injection
Multiple SQL injection vulnerabilities in CubeCart 3.0.11 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) oid parameter in modules/gateway/Protx/confirmed.php and the (2) x_invoice_num parameter in modules/gateway/Authorize/confirmed.php.
by rgod
CVE-2006-4020 EXPLOITDB php VERIFIED
PHP <5.1.4 & <4.4.3 - Buffer Overflow
scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
by Andi
CVE-2006-4191 EXPLOITDB php VERIFIED
XMB Software Extreme Message Board < 1.9.6 - Path Traversal
Directory traversal vulnerability in memcp.php in XMB (Extreme Message Board) 1.9.6 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the langfilenew parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by header.php.
by rgod
EIP-2026-104696 EXPLOITDB php VERIFIED
PHP 4.4.3/5.1.4 - 'objIndex' Local Buffer Overflow
by Heintz
CVE-2006-4043 EXPLOITDB php VERIFIED
myWebland myBloggie <2.1.4 - Info Disclosure
index.php in myWebland myBloggie 2.1.4 and earlier allows remote attackers to obtain sensitive information via a query that only specifies the viewdate mode, which reveals the table prefix in a SQL error message.
by rgod
CVE-2006-4455 EXPLOITDB php VERIFIED
Xchat < 2.6.7 - Denial of Service
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
by ratboy
CVE-2006-4042 EXPLOITDB php VERIFIED
Mywebland Mybloggie < 2.1.4 - SQL Injection
Multiple SQL injection vulnerabilities in trackback.php in myWebland myBloggie 2.1.4 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) title, (2) url, (3) excerpt, or (4) blog_name parameters.
by rgod
EIP-2026-111978 EXPLOITDB php VERIFIED
SendCard 3.4.0 - Unauthorized Administrative Access
by rgod
CVE-2006-3994 EXPLOITDB php VERIFIED
XMB Software Xmb Forum < 1.9.6_alpha - SQL Injection
SQL injection vulnerability in the u2u_send_recp function in u2u.inc.php in XMB (aka extreme message board) 1.9.6 Alpha and earlier allows remote attackers to execute arbitrary SQL commands via the u2uid parameter to u2u.php, which is directly accessed from $_POST and bypasses the protection scheme.
by rgod
CVE-2006-3996 EXPLOITDB php VERIFIED
Adaptive Technology Resource Centre Atutor < 1.5.3.1 - SQL Injection
SQL injection vulnerability in links/index.php in ATutor 1.5.3.1 and earlier allows remote authenticated users to execute arbitrary SQL commands via the (1) desc or (2) asc parameters.
by rgod
CVE-2006-4004 EXPLOITDB php VERIFIED
Vbportal - Path Traversal
Directory traversal vulnerability in index.php in vbPortal 3.0.2 through 3.6.0 Beta 1, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the bbvbplang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
by r00t
CVE-2006-3904 EXPLOITDB php VERIFIED
Etomite < 0.6.1 - SQL Injection
SQL injection vulnerability in manager/index.php in Etomite CMS 0.6.1 and earlier, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the username parameter.
by rgod
CVE-2006-7070 EXPLOITDB php VERIFIED
Etomite < 0.6.1 - Improper Input Validation
Unrestricted file upload vulnerability in manager/media/ibrowser/scripts/rfiles.php in Etomite CMS 0.6.1 and earlier allows remote attackers to upload and execute arbitrary files via an nfile[] parameter with a filename that contains a .php extension followed by a valid image extension such as .gif or .jpg, then calling the rename function.
by rgod
CVE-2006-3851 EXPLOITDB php VERIFIED
X7 Group X7 Chat - SQL Injection
SQL injection vulnerability in upgradev1.php in X7 Chat 2.0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the old_prefix parameter.
by rgod
CVE-2006-3832 EXPLOITDB php VERIFIED
Gerrit VAN Aaken Loudblog - SQL Injection
SQL injection vulnerability in index.php in Gerrit van Aaken Loudblog 0.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
by rgod
CVE-2006-3362 EXPLOITDB php VERIFIED
FCKeditor mcpuk - Unrestricted File Upload
Unrestricted file upload vulnerability in connectors/php/connector.php in FCKeditor mcpuk file manager, as used in (1) Geeklog 1.4.0 through 1.4.0sr3, (2) toendaCMS 1.0.0 Shizouka Stable and earlier, (3) WeBid 0.5.4, and possibly other products, when installed on Apache with mod_mime, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension and a trailing extension that is allowed, such as .zip.
by rgod
CVE-2011-5035 EXPLOITDB php VERIFIED
Oracle Glassfish Server < 3.1.1 - Improper Input Validation
Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
by rgod