exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files

phpMyAdmin Arbitrary File Read
Posted Nov 2, 2011
Authored by WooYun | Site wooyun.org

phpMyAdmin suffers from a remote arbitrary file reading vulnerability when using a simplexml_load_string function meant to read xml from user input.

tags | exploit, remote, arbitrary
SHA-256 | e9107c1ea9ecd076a0b594c54978d18ecaa5e210966639afd6ab79b6715853a9

Related Files

phpMyAdmin 4.8.1 Remote Code Execution
Posted Oct 25, 2021
Authored by samguy

phpMyAdmin version 4.8.1 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2018-12613
SHA-256 | c7fd500b6b33a3e044159ceaba0504a93de489c811db969c2903f7741e995f09
phpMyAdmin 4.9.0.1 Cross Site Request Forgery
Posted Sep 13, 2019
Authored by Manuel Garcia Cardenas

phpMyAdmin version 4.9.0.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2019-12922
SHA-256 | 3b362d9ec9ed47dccd9f79635b1b308b77972a0c8eb23da78a9514ca445654da
phpMyAdmin 4.8 Cross Site Request Forgery
Posted Jun 11, 2019
Authored by Riemann

phpMyAdmin version 4.8 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2019-12616
SHA-256 | 1195e94c941b44b7613f283cea8689e64c13b0485be6d8b2b38539f01103e2c4
phpMyAdmin 4.8.1 Authenticated Local File Inclusion
Posted Nov 27, 2018
Authored by Lucian Ioan Nitescu

phpMyAdmin version 4.8.1 authenticated local file inclusion proof of concept exploits.

tags | exploit, local, proof of concept, file inclusion
advisories | CVE-2018-12613
SHA-256 | 99adf4308fa706903d75dfc6e085c7ba2d9885c407bb3424f26d594818c0460a
phpMyAdmin Credential Stealer
Posted Sep 9, 2018
Authored by Dhiraj Mishra | Site metasploit.com

This Metasploit module gathers phpMyAdmin credentials from a target linux machine.

tags | exploit
systems | linux
SHA-256 | 5ff70db330dfb5a4f9e077101c4ac494e8ecbbd010bd2c1ee7d93939ca5de46d
phpMyAdmin 4.7.x Cross Site Request Forgery
Posted Aug 31, 2018
Authored by VulnSpy

phpMyAdmin version 4.7.x suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2017-1000499
SHA-256 | e63d2dcc5948a45882c170f9e3e441a265cf1233d27f4dee8c082aeef27611e0
phpMyAdmin Authenticated Remote Code Execution
Posted Jul 12, 2018
Authored by Jacob Robles, ChaMd5, Henry Huang | Site metasploit.com

phpMyAdmin v4.8.0 and v4.8.1 are vulnerable to local file inclusion, which can be exploited post-authentication to execute PHP code by application. The module has been tested with phpMyAdmin v4.8.1.

tags | exploit, local, php, file inclusion
advisories | CVE-2018-12613
SHA-256 | dae18ef3348cf3077fd1fd7c0054e8bcb0185fb7e809a95ee03722cd6aacb0d5
phpMyAdmin 4.8.1 Code Execution / Local File Inclusion
Posted Jun 22, 2018
Authored by VulnSpy

phpMyAdmin version 4.8.1 suffers from a local file inclusion vulnerability that can lead to code execution.

tags | exploit, local, code execution, file inclusion
advisories | CVE-2018-12613
SHA-256 | 7050bd8ba32a957693bf8e975344bff3d03e5961028dc6d3ce1b55150c1c75bd
phpMyAdmin 4.8.1 Local File Inclusion
Posted Jun 22, 2018
Authored by ChaMd5

phpMyAdmin version 4.8.1 suffers from an authenticated local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 10f1c79df42b570582f12ca0a79fda04ac535de993f89a192efc5df8747b4b0d
phpMyAdmin 4.x Remote Code Execution
Posted Jun 18, 2018
Authored by Matteo Cantoni, Cure53, Michal AihaA | Site metasploit.com

phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.

tags | exploit, remote, arbitrary, php
advisories | CVE-2016-5734
SHA-256 | 46f778fd23af1e4e604d32a71ab007e759502445aee2fac99855d70658df179c
phpMyAdmin Cross Site Request Forgery
Posted Apr 23, 2018
Authored by revengsh

phpMyAdmin versions 4.8.0 prior to 4.8.0-1 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2018-10188
SHA-256 | 9cfd84da87554bcd8174bf97790826c4ca7d710ed62b418752b378c57b0699c5
phpMyAdmin Authenticated Remote Code Execution
Posted Apr 29, 2013
Authored by Janek Vind aka waraxe | Site metasploit.com

This Metasploit module exploits a PREG_REPLACE_EVAL vulnerability in phpMyAdmin's replace_prefix_tbl within libraries/mult_submits.inc.php via db_settings.php. This affects versions 3.5.x below 3.5.8.1 and 4.0.0 below 4.0.0-rc3. PHP versions greater than 5.4.6 are not vulnerable.

tags | exploit, php
advisories | CVE-2013-3238, OSVDB-92793
SHA-256 | cde46aba3bb442a48c277780f2ae183ec296c40bdbad1fb176830924a1405679
phpMyAdmin 3.5.2.2 server_sync.php Backdoor
Posted Sep 26, 2012
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits an arbitrary code execution backdoor placed into phpMyAdmin version 3.5.2.2 through a compromised SourceForge mirror.

tags | exploit, arbitrary, code execution
SHA-256 | 59077add4c187d53c147d92602048e756381c136f672e418d6ccc8272b22fa12
phpMyAdmin 3.3.x / 3.4.x Local File Inclusion Via XXE Injection
Posted Jan 16, 2012
Authored by Marco Batista | Site metasploit.com

phpMyAdmin versions 3.3.x and 3.4.x suffer from a local file inclusion vulnerability via XXE injection. The attacker must be logged in to MySQL via phpMyAdmin.

tags | exploit, local, file inclusion, xxe
advisories | CVE-2011-4107, OSVDB-76798
SHA-256 | 3198e8d89bc1a8cc793e92a6136c7fe6f956875742096c8de8840899af48ddb4
phpMyAdmin Session Serialized Code Execution
Posted Dec 27, 2011
Authored by M4g

phpMyAdmin versions prior to 3.3.10.2 and 3.4.3.1 Session Serializer arbitrary PHP code execution exploit.

tags | exploit, arbitrary, php, code execution
SHA-256 | 5e7ad567c633e8ad8056175f53ce0b27b0f71ab25dcad559a953f71c06756cc9
phpMyAdmin 3.x Swekey Session Manipulation
Posted Jul 25, 2011
Authored by Mango

phpMyAdmin versions below 3.3.10.3 and 3.4.3.2 suffer from a session manipulation vulnerability when the Swekey extension is activated.

tags | advisory
advisories | CVE-2011-2719
SHA-256 | 4f0f8d6c23093df629d9ead3d0bece7eb8518e3b4ee9aeea91d3ae070f63ee29
phpMyAdmin 3.x Swekey Remote Code Injection
Posted Jul 9, 2011
Authored by Mango

phpMyAdmin Swekey remote code injection exploit that affects versions prior to 3.4.3.1 and versions prior to 3.3.10.2.

tags | exploit, remote
advisories | CVE-2011-2505, CVE-2011-2506
SHA-256 | ad7c03013a93cbfc3a71ddcf1e0e7a96dc3afaf12cd89e7617e169215191b09f
phpMyAdmin 3.x Remote Code Execution
Posted Jul 8, 2011
Authored by Mango

phpMyAdmin version 3.x suffers from multiple remote code execution vulnerabilities.

tags | exploit, remote, vulnerability, code execution
advisories | CVE-2011-2505, CVE-2011-2506, CVE-2011-2507, CVE-2011-2508
SHA-256 | 2c8f67b34ff9e950a203c8d95cb5db1edaf669e76877d659e135f52bfce8de93
Yakamoz phpMyAdmin Finder
Posted Jun 30, 2011
Authored by Bl4ck.Viper

This is a simple perl script that enumerates various possible directories on a given website in order to determine whether or not a phpMyAdmin instance may be installed.

tags | tool, scanner, perl
systems | unix
SHA-256 | 1f00827393ec5f0b4d92aa4c0dfd1657cfa2e7a567c31c7aec7d9e2d47baf1dc
phpMyAdmin 3.3.9 Brute Force / Path Disclosure
Posted Feb 28, 2011
Authored by MustLive

phpMyAdmin versions 3.3.9 and below suffers from brute force and path disclosure vulnerabilities.

tags | advisory, cracker, vulnerability, info disclosure
advisories | CVE-2011-0986
SHA-256 | 57dff876815eb07a5a14b2a29cab989fa9f079aa94371b1d74b85134fb0f35f5
phpMyAdmin 3.4.x Stored Cross Site Scripting
Posted Jan 26, 2011
Authored by Aung Khant | Site yehg.net

phpMyAdmin versions 3.4.x and 3.4.0 beta 2 suffer from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6c62a516dcba43d0e52fddd8b8bbc0b20bf6c067e550603506999902959ff3d8
phpMyAdmin Client Side Code Injection
Posted Dec 6, 2010
Authored by Emanuele Gentili, white_sheep, Alessandro Scoscia

phpMyAdmin suffers from client side code injection and redirect link falsification vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 1909f0c63f7acbf171fbb40d96182a3ac8dfc8931cca96fca2ea11b4f539118b
phpMyAdmin 3.3.5 / 2.11.10 Cross Site Scripting
Posted Aug 21, 2010
Authored by Aung Khant | Site yehg.net

phpMyAdmin versions 3.3.5 and below and 2.11.10 and below suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 683d4d1d848e1bf87e1ddd1c9586a465184804a8748418fcf1ed55261779cf1d
phpMyAdmin 3.3.0 Cross Site Scripting
Posted Mar 12, 2010
Authored by Liscker

phpMyAdmin version 3.3.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8aa29d886eb65b49c4d21533ec1a6f3a100b671f7165a14504b14bce63fa2114
PhpMyAdmin Config File Code Injection
Posted Dec 31, 2009
Authored by PAgVac, Greg Ose | Site metasploit.com

This Metasploit module exploits a vulnerability in PhpMyAdmin's setup feature which allows an attacker to inject arbitrary PHP code into a configuration file. The original advisory says the vulnerability is present in phpMyAdmin versions 2.11.x < 2.11.9.5 and 3.x < 3.1.3.1; this module was tested on 3.0.1.1. The file where our payload is written (phpMyAdmin/config/config.inc.php) is not directly used by the system, so it may be a good idea to either delete it or copy the running config (phpMyAdmin/config.inc.php) over it after successful exploitation.

tags | exploit, arbitrary, php
advisories | CVE-2009-1151
SHA-256 | c6dcd3c567ac45d96e97a2bc40e1b5ef02017edab7e4eb3995b6fbcd852cad26
Page 1 of 2
Back12Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close