exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

php5-unserialize.txt
Posted Oct 20, 2006
Authored by slythers

PHP 5 ecalloc memory manager unserialize() array integer overflow proof of concept exploit.

tags | exploit, overflow, php, proof of concept
SHA-256 | d4d2a7ebf01f65bf0871fe99b935491efb8bb3a3e3e029d5317331679ec0f317

Related Files

php_nuke_captcha.zip
Posted Apr 21, 2008
Authored by Michael Brooks | Site rooksecurity.com

Tool that demonstrates how the CAPTCHA used in PHP-Nuke version 8.1 can be deciphered with 100% accuracy.

tags | exploit, php
SHA-256 | b6a2d80689a601a1e69a0dc8960bbdc9c3765dfc74c229767bceb218d7547ada
php123-sql.txt
Posted Jul 31, 2007
Authored by t0pp8uzz, xprog

PHP123 Top Sites suffers from a SQL injection vulnerability in category.php.

tags | exploit, php, sql injection
SHA-256 | f21098b29040edf100e7ff0a373cfd2e77b1affa4fa918d44c2f43ff63639f40
php-file-upload.pdf
Posted Jun 15, 2007
Authored by Alla Bezroutchko | Site scanit.be

Whitepaper discussing secure file upload in PHP web applications.

tags | paper, web, php, file upload
SHA-256 | c2f310516a6d4d5db4170ff162f315419894a825ccc044c82abbc2e20b2cdee4
php121-lfi.txt
Posted Apr 10, 2007
Authored by Dj7xpl

PHP121 Instant Messenger version 2.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | ec27accc2ef9b25f3a64e9dfd4a484a34ba0918af51bb9eb925cae2e924260c1
php-readfile.txt
Posted Mar 27, 2007
Authored by ThE-WolF-ksA

PHP versions below 4.4.4, 5.2.1, and 5.1.6 suffer from a readfile() safe mode bypass vulnerability.

tags | exploit, php, bypass
SHA-256 | 2f92559142ea978bb19ae97f7de8910992d71b174807d71a769362f9bf62af97
php-rgod.txt
Posted Mar 20, 2007
Authored by rgod | Site retrogod.altervista.org

PHP versions 4.4.6 and below ibase_connect() local buffer overflow exploit.

tags | exploit, overflow, local, php
SHA-256 | 780d56c33d496973ba91e499096397ea02245bee3b5dea900339ad186b55dcc6
PHP import_request_variables() Arbitrary Variable Overwrite
Posted Mar 9, 2007
Authored by Stefano Di Paola, Francesco Ongaro | Site wisec.it

PHP versions greater than or equal to 4.0.7 and less than or equal to 5.2.1 suffer from an arbitrary variable overwrite in import_request_variables().

tags | exploit, arbitrary, php
SHA-256 | 5fa15988075ab903a6fb5db15ca53a4cf5cbc587310a227e5c83e5aa6494637b
php_446_crack_opendict_local_bof.txt
Posted Mar 9, 2007
Authored by rgod | Site retrogod.altervista.org

PHP version 4.4.6 crack_opendict() local buffer overflow exploit.

tags | exploit, overflow, local, php
SHA-256 | 94c68df67e2e1df9884d7e59cdc21affda88015442b720d1db00be61a81e5c00
php_446_mssql_connect_bof.txt
Posted Mar 8, 2007
Authored by rgod | Site retrogod.altervista.org

PHP versions 4.4.6 and below mssql_connect() and mssql_pconnect() local buffer overflow exploit.

tags | exploit, overflow, local, php
SHA-256 | 92d4547d24e68dddd983ba158385a312924951aeaa3d8dccb81e10b405a832f7
php-exec.txt
Posted Oct 27, 2006
Authored by Bernhard Mueller | Site sec-consult.com

POC exploit for the PHP exec, system, popen file descriptor bug that overwrites Apache's log file.

tags | exploit, php
SHA-256 | b21b5612f3dfa05f10f1e95eb766c9a109f1aa1f7878f56b937c1a95c857c4b4
php-fd.txt
Posted Oct 21, 2006
Authored by dimmoborgir

The php functions "exec", "system", "popen" (and similar) keep file descriptors of the parent process opened. When a new process is run this program will inherit all opened file descriptors of its parent. This can be used by hostile programs to listen and accept connections on port 80, or write to the apache log files.

tags | advisory, php
SHA-256 | df0886b7417f348dce9959a45e47a889aa6e01dd100f026507d0c694e50c33e3
PHP-Post.txt
Posted Oct 9, 2006
Authored by HACKERS PAL | Site soqor.net

PHP-Post suffers from multiple input validation vulnerabilities.

tags | advisory, php, vulnerability
SHA-256 | 20323cc7139975eeb177172778044c5303cf3f0bb4523ffbeb10f9a9ceea6aaa
php_news-2.0.txt
Posted Oct 3, 2006
Authored by Root3r_H3ll | Site Www.PersainFox.com

php_news 2.0 and prior are vulnerable to several remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | bb0016bf49266da56ea374a5ca848ca6eb9d6dd563c3cf1ea2ef2b238573b2ea
PHP-Nuke-v3.txt
Posted Jun 29, 2006
Authored by CrAzY CrAcKeR

PHP-Nuke Module's Name Sections V3 suffers from a SQL injection vulnerability.

tags | advisory, php, sql injection
SHA-256 | f86e7eb93ea54b5e29bb6066b6c8835b1564898e6dfa7c4539e269b00ea5cfec
php-error_log.txt
Posted Jun 29, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

It is possible to use the error_log function to bypass safe mode in PHP 5.1.4 and 4.4.2

tags | advisory, php
SHA-256 | 69dcde6236188d1a1843507726eaab7b5d146ea0cda8bb889b32fc10c645b338
PHP-Nuke-7.9.txt
Posted Jun 11, 2006
Authored by O.G.

PHP-Nuke versions less than or equal to 7.9 suffer from XSS in the Search parameter.

tags | advisory, php
SHA-256 | 2c42dbc929e90f1c4de919b2eb6ff7030e3ba73407eb06c3deb08e9e14905ede
php-4.4.2-crash.txt
Posted Apr 14, 2006
Authored by Maksymilian Arciemowicz

It is possible to crash php and possibly apache by using a recursive function call. Tested on PHP 4.4.2 and 5.1.2.

tags | advisory, php
SHA-256 | 629e887103a607ea88675761f74bad078c61e2d2c8db6ebab560d5d9890a5b87
php121im_14_sql_xpl.txt
Posted Apr 14, 2006
Authored by rgod | Site retrogod.altervista.org

PHP121 Instant Messenger versions less than or equal to 1.4 remote commands execution exploit.

tags | exploit, remote
SHA-256 | 4f500420ae021a12f0c97b72682ef7dc378e59151587d6457602e17d599689fe
php_stats_0191_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

PHP-Stats versions 0.1.9.1 and below option overwrite and remote command execution exploit.

tags | exploit, remote, php
SHA-256 | 5e1df32cb784ea2095f9714c2811df794f7a6ceccdb4d96467d22db47a8e1688
php_live-3.0.txt
Posted Mar 23, 2006
Authored by kspecial

PHP Live! 3.0 suffers from XSS in status_image.php.

tags | advisory, php
SHA-256 | 34e8bfbf37cc8f4b08ab9bbb61900ada026b59bdb97d451be810b4b8cc75abc3
php-atm.txt
Posted Mar 10, 2006
Authored by Liz0ziM | Site biyosecurity.com

It is possible to download the users password hashed in PHP Advanced Transfer Manager 1.x via a special URL.

tags | exploit, php
SHA-256 | 94dd1adf4a7926508e3f52f536f7a190f575b355f715a85e793baf17aa2aa609
php_stats_0191_adv.txt
Posted Mar 8, 2006
Authored by rgod | Site retrogod.altervista.org

PHP-Stats versions 0.1.9.1 and below suffer from remote directory traversal, SQL injection, and command execution flaws.

tags | exploit, remote, php, sql injection
SHA-256 | 5e1bb3d424f9a3bfb779ba437927c5754cc6e55f28507e15a6b60e3aa1950db1
php-stanford.txt
Posted Dec 14, 2005
Authored by Stanford Researchers

A group of Stanford researchers have discovered 99 vulnerabilities when auditing e107 version 0.7, myBloggie version 2.1.3beta, utopia NewPro version 1.1.4, DCP Portal version 6.1.1, and PHP Webthings version 1.4. They have not released exploitation information, however.

tags | advisory, php, vulnerability
SHA-256 | 9f4befbadd47367ea11c650c514480272ba50d6d8d9f8494e5e8c9df32678f71
php-handicapper.txt
Posted Nov 3, 2005
Authored by BiPi_HaCk | Site NightmareTeAmZ.altervista.org

PHP HANDICAPPER is susceptible to cross site scripting, SQL injection, and other flaws. Details provided.

tags | exploit, php, xss, sql injection
SHA-256 | 2b6f990448729227c0ef62fc5049f14e49cdcabb515a207f26749fe31b402dc7
PHP-Nuke-XSS.txt
Posted Oct 27, 2005
Authored by bhfh01

PHP-Nuke is susceptible to cross site scripting attacks.

tags | exploit, php, xss
SHA-256 | 7d26a61ef6f2ad7823422e467d0666ed5a5618f7a4980bb9f719510f18948a95
Page 3 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close