Vulnerabilities > CVE-2006-4877 - Unspecified vulnerability in David Bennett PHP-Post
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN david-bennett
exploit available
Summary
Variable overwrite vulnerability in David Bennett PHP-Post (PHPp) 1.0 and earlier allows remote attackers to overwrite arbitrary program variables via multiple vectors that use the extract function, as demonstrated by the table_prefix parameter in (1) index.php, (2) profile.php, and (3) header.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | PHP-post Web Forum 0.x.1.0 profile.php Multiple Parameter SQL Injection. CVE-2006-4877. Webapps exploit for php platform |
id | EDB-ID:28591 |
last seen | 2016-02-03 |
modified | 2006-09-16 |
published | 2006-09-16 |
reporter | HACKERS PAL |
source | https://www.exploit-db.com/download/28591/ |
title | PHP-post Web Forum 0.x.1.0 profile.php Multiple Parameter SQL Injection |
References
- http://secunia.com/advisories/22014
- http://secunia.com/advisories/22014
- http://securityreason.com/securityalert/1607
- http://securityreason.com/securityalert/1607
- http://www.osvdb.org/28965
- http://www.osvdb.org/28965
- http://www.osvdb.org/28966
- http://www.osvdb.org/28966
- http://www.osvdb.org/28967
- http://www.osvdb.org/28967
- http://www.securityfocus.com/archive/1/446318/100/0/threaded
- http://www.securityfocus.com/archive/1/446318/100/0/threaded
- http://www.securityfocus.com/bid/20061
- http://www.securityfocus.com/bid/20061
- http://www.vupen.com/english/advisories/2006/3688
- http://www.vupen.com/english/advisories/2006/3688