what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

php5-unserialize.txt
Posted Oct 20, 2006
Authored by slythers

PHP 5 ecalloc memory manager unserialize() array integer overflow proof of concept exploit.

tags | exploit, overflow, php, proof of concept
SHA-256 | d4d2a7ebf01f65bf0871fe99b935491efb8bb3a3e3e029d5317331679ec0f317

Related Files

PHP apache_request_headers Function Buffer Overflow
Posted Jun 17, 2012
Authored by juan vazquez, Vincent Danen | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in the CGI version of PHP 5.4.x before 5.4.3. The vulnerability is due to the insecure handling of the HTTP headers. This Metasploit module has been tested against the thread safe version of PHP 5.4.2, from "windows.php.net", running with Apache 2.2.22 from "apachelounge.com".

tags | exploit, web, overflow, cgi, php
systems | windows
advisories | CVE-2012-2329, OSVDB-82215
SHA-256 | 9911ce27bffaa90bdbd0d7a764559440c9b73d2a107c14d2ddcf46c3708a6749
WordPress plugin Foxypress uploadify.php Arbitrary Code Execution
Posted Jun 12, 2012
Authored by patrick, Sammy FORGIT | Site metasploit.com

This Metasploit module exploits an arbitrary PHP code execution flaw in the WordPress blogging software plugin known as Foxypress. The vulnerability allows for arbitrary file upload and remote code execution via the uploadify.php script. The Foxypress plug-in versions 0.4.2.1 and below are vulnerable.

tags | exploit, remote, arbitrary, php, code execution, file upload
advisories | OSVDB-82652
SHA-256 | da0008da963d30190b80ec624d76b37a43a7996230c2eda836dbddf9adef1f96
PHP Volunteer Management System v1.0.2 Arbitrary File Upload
Posted May 31, 2012
Authored by sinn3r, Ashoo | Site metasploit.com

This Metasploit module exploits a vulnerability found in PHP Volunteer Management System, versions 1.0.2 and prior. This application has an upload feature that allows an authenticated user to upload anything to the 'uploads' directory, which is actually reachable by anyone without a credential. An attacker can easily abuse this upload functionality first by logging in with the default credential (admin:volunteer), upload a malicious payload, and then execute it by sending another GET request.

tags | exploit, php
SHA-256 | a9247fc86c26d352083bf798cdd011abca8e533b47fe3653ae48f91b1a8c9e3b
PHP CGI Argument Injection
Posted May 6, 2012
Site metasploit.com

When run as a CGI, PHP up to version 5.3.12 and 5.4.2 is vulnerable to an argument injection vulnerability. This Metasploit module takes advantage of the -d flag to set php.ini directives to achieve code execution. From the advisory: "if there is NO unescaped '=' in the query string, the string is split on '+' (encoded space) characters, urldecoded, passed to a function that escapes shell metacharacters (the "encoded in a system-defined manner" from the RFC) and then passes them to the CGI binary."

tags | exploit, shell, cgi, php, code execution
advisories | CVE-2012-1823, OSVDB-81633
SHA-256 | b19f8f4342eff5bad4cc51580c640170655b2809104d5e7835692a1eb116a923
PHP 5.3.10 / 5.4.0 Cross Site Scripting
Posted Apr 9, 2012
Authored by Akastep

PHP versions 5.3.10 and 5.4.0 suffer from a cross site scripting vulnerability when display_errors is set to on and html_errors is set to on.

tags | exploit, php, xss
SHA-256 | 045dd019320c71cb81f5b97a0acf804293d0d1c9b041d0f7f586853578b51c32
Linux/x86 Search / Inject PHP Backdoor Shellcode
Posted Jan 25, 2012
Authored by KedAns-Dz

This Linux/x86 shellcode searches .php files and injects a PHP backdoor into them.

tags | x86, php, shellcode
systems | linux
SHA-256 | 083be87460a5024c26d79b3f9143ff66d4099a6b438b7ea88f793822bed39c10
Local Session Poisoning In PHP Part 3
Posted Oct 14, 2011
Authored by Mango

This whitepaper is called Local Session Poisoning in PHP Part 3: Bypassing Suhosin's Session Encryption.

tags | paper, local, php
SHA-256 | b4c2757edc23926772d3931a43343d42a16d61a0d0eeaf402605d9c79122b967
Local Session Poisoning In PHP Part 2
Posted Oct 14, 2011
Authored by Mango

This whitepaper is called Local Session Poisoning in PHP Part 2: Promiscuous Session Files.

tags | paper, local, php
SHA-256 | a5b53f4b5bd46c66cfc9ad3a8d7d286455bc7a43f332c3b1e6ccb2290c69cb84
Local Session Poisoning In PHP Part 1
Posted Oct 14, 2011
Authored by Mango

This whitepaper is called Local Session Poisoning in PHP Part 1: The Basics of Exploitation and How to Secure a Server.

tags | paper, local, php
SHA-256 | c245f17fa9754ac7a72df98693b35929e796d3a655aeb50b5fa88d746027aa9e
PHP Session Snooping
Posted Oct 14, 2011
Authored by Mango

Brief write up with a proof of concept explaining local session snooping in PHP.

tags | exploit, local, php, proof of concept
SHA-256 | a84ca642d685d472d8bdfa3fa84d30b724025d72ebec2bae38b90f52fc241d78
PHP Session Hijacking
Posted Oct 14, 2011
Authored by Mango

Brief write up with a proof of concept explaining local session hijacking in PHP.

tags | exploit, local, php, proof of concept
SHA-256 | c5099b1e7690d5d716238987cd3fe94c2ec425e441ee4155e5d47e1f6cad678e
Whitepaper About PHP Trojans
Posted Jan 30, 2010
Authored by shad0w_crash

Small whitepaper detailing simple methodologies surrounding PHP trojans.

tags | paper, trojan, php
SHA-256 | 6af6687dfb6f63aecb232c3f8a37be1090352507eda4e8000e630ee071dcc16c
PHP RFI Prevention
Posted Jan 26, 2010

Whitepaper called PHP RFI Prevention. Written in Turkish.

tags | paper, php, code execution, file inclusion
SHA-256 | 9b285f924d3fec07f867d5721ad0668203170946fe83e8003360acbb89f9619f
PHP Include Generic Exploit
Posted Dec 31, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits various php include vulnerabilities.

tags | exploit, php, vulnerability
SHA-256 | e357d04e020edf1f4d458c10f229063fd076425a03411ffdd5eba7edcc75455a
PHP MultiPart For-Data Denial Of Service
Posted Nov 23, 2009
Authored by Bogdan Calin | Site acunetix.com

PHP MultiPart Form-Data denial of service proof of concept exploit.

tags | exploit, denial of service, php, proof of concept
SHA-256 | 56ed6bc37b2f5f076954de0fda0f42085950231ca16763028f6e873710289eea
PHP XML-RPC Arbitrary Code Execution
Posted Oct 30, 2009
Authored by H D Moore, cazz | Site metasploit.com

This Metasploit module exploits an arbitrary code execution flaw discovered in many implementations of the PHP XML-RPC module. This flaw is exploitable through a number of PHP web applications, including but not limited to Drupal, Wordpress, Postnuke, and TikiWiki.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-1921
SHA-256 | 74661987981d6b9dcef06ec55c6a9cc16d40945f635c122f6a84bdf7a7d57158
WordPress cache_lastpostdate Arbitrary Code Execution
Posted Oct 30, 2009
Authored by str0ke

This Metasploit module exploits an arbitrary PHP code execution flaw in the WordPress blogging software. This vulnerability is only present when the PHP 'register_globals' option is enabled (common for hosting providers). All versions of WordPress prior to 1.5.1.3 are affected.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2005-2612
SHA-256 | 48bc9a7f494787739544970c6c99713c4b117e44e8d9158a5aec89776fe41a8c
vBulletin misc.php Template Name Arbitrary Code Execution
Posted Oct 30, 2009
Authored by str0ke

This Metasploit module exploits an arbitrary PHP code execution flaw in the vBulletin web forum software. This vulnerability is only present when the "Add Template Name in HTML Comments" option is enabled. All versions of vBulletin prior to 3.0.7 are affected.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-0511
SHA-256 | fa3b7c956cd40ecf976491e6947389c4105b5b3887700ed3c774711a1b161525
PHP168 6.0 Command Execution
Posted Oct 28, 2009
Authored by Securitylab Security Research | Site securitylab.ir

PHP168 version 6.0 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 7d3ac50b84ef1608fd1f5fe0d8857116e4802f6cc6d2420ed0136ca88706a75a
PHP 4 unserialize() ZVAL Reference Counter Overflow
Posted Oct 27, 2009
Authored by H D Moore, Stefan Esser, GML | Site metasploit.com

This Metasploit module exploits an integer overflow vulnerability in the unserialize() function of the PHP web server extension.

tags | exploit, web, overflow, php
advisories | CVE-2007-1286
SHA-256 | 436f0bc029967671da472d8ca912c40b8636846cfd3d8f81e3a0fd1d8a030e1f
PHP 5.2.10 / 5.3.0 Memory Disclosure
Posted Aug 11, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHP versions 5.2.10 and 5.3.0 suffer from a memory disclosure vulnerability.

tags | advisory, php, info disclosure
SHA-256 | 3d596b7080a1f32c18d2373f6501a9c540935c67cdcee3b3d4fa38ba096362d2
State Of The Art Post Exploitation In Hardened PHP Environments
Posted Jul 1, 2009
Authored by Stefan Esser | Site sektioneins.de

Whitepaper called State Of The Art Post Exploitation In Hardened PHP Environments.

tags | paper, php
SHA-256 | 7928c94b9af3be5e10b1f29f0a78a75c860ab2291068409148ffbbe3e6f3808f
PHP Fuzzing In Action
Posted Mar 9, 2009
Authored by Abysssec | Site abysssec.com

PHP Fuzzing In Action - 20 Ways To Fuzz PHP Source Code.

tags | paper, php
SHA-256 | c801fa5bcab877511e3678eea2660852faecbdbf87a4d6cdc8d0712f8ed2e458
OpenHelpDesk 1.0.100 Code Execution
Posted Feb 2, 2009
Authored by LSO

This Metasploit module is for OpenHelpDesk version 1.0.100 that is vulnerability to php code execution to an improper use of eval().

tags | exploit, php, code execution
SHA-256 | 790a572fa2eaf8a14620e19f2985d1b25f1ddb1857ea163771dbd4fb5f3c3ffe
PHP Autorooter Script
Posted Dec 30, 2008
Authored by Rohit Bansal

PHP Autorooter that encodes exploits in Base64 and then decodes them and compiles them with gcc.

tags | exploit, php
SHA-256 | dad858b67667d67dc91c0c6bb8aa6779134347d2029f21d5bec096a6b7bcf35d
Page 2 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close