CVE-2006-1208

Sergey Korostel PHP Upload Center allows remote attackers to execute arbitrary PHP code by uploading a file whose name ends in a .php.li extension, which can be accessed from the upload directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sergey_korostel:php_upload_center:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:08

Type Values Removed Values Added
References () http://biyosecurity.be/bugs/phpuploadcenter2.txt - Exploit () http://biyosecurity.be/bugs/phpuploadcenter2.txt - Exploit
References () http://secunia.com/advisories/19107 - Vendor Advisory () http://secunia.com/advisories/19107 - Vendor Advisory
References () http://securityreason.com/securityalert/564 - () http://securityreason.com/securityalert/564 -
References () http://www.blogcu.com/Liz0ziM/317250/ - Exploit, URL Repurposed () http://www.blogcu.com/Liz0ziM/317250/ - Exploit, URL Repurposed
References () http://www.osvdb.org/23626 - () http://www.osvdb.org/23626 -
References () http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html - URL Repurposed () http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html - URL Repurposed
References () http://www.securityfocus.com/archive/1/427215/100/0/threaded - () http://www.securityfocus.com/archive/1/427215/100/0/threaded -
References () http://www.vupen.com/english/advisories/2006/0817 - () http://www.vupen.com/english/advisories/2006/0817 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://www.blogcu.com/Liz0ziM/317250/ - Exploit () http://www.blogcu.com/Liz0ziM/317250/ - Exploit, URL Repurposed
References () http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html - () http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html - URL Repurposed

Information

Published : 2006-03-14 01:06

Updated : 2025-04-03 01:03


NVD link : CVE-2006-1208

Mitre link : CVE-2006-1208

CVE.ORG link : CVE-2006-1208


JSON object : View

Products Affected

sergey_korostel

  • php_upload_center