what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 5,337 RSS Feed

PHP Files

Men Salon Management System 2.0 PHP Code Injection
Posted Sep 13, 2024
Authored by indoushka

Men Salon Management System version 2.0 suffers from a php code injection vulnerability.

tags | exploit, php
SHA-256 | 16f109978dab4dd654ee4cf808111eef9a65cfb018b4dd430500f6c941a7322c
Auto/Taxi Stand Management System 1.0 PHP Code Injection
Posted Sep 13, 2024
Authored by indoushka

Auto/Taxi Stand Management System version 1.0 suffers from a php code injection vulnerability.

tags | exploit, php
SHA-256 | 1e0b4094b37e8533f3a72e374f0e297723b05a67a6a446f3a2c4f4ba0aa4bdb2
SPIP BigUp 4.3.1 / 4.2.15 / 4.1.17 Unauthenticated Remote Code Execution
Posted Sep 12, 2024
Authored by Valentin Lobstein, Laluka, Julien Voisin, Vozec | Site metasploit.com

This Metasploit module exploits a Remote Code Execution vulnerability in the BigUp plugin of SPIP. The vulnerability lies in the lister_fichiers_par_champs function, which is triggered when the bigup_retrouver_fichiers parameter is set to any value. By exploiting the improper handling of multipart form data in file uploads, an attacker can inject and execute arbitrary PHP code on the target server. This critical vulnerability affects all versions of SPIP from 4.0 up to and including 4.3.1, 4.2.15, and 4.1.17. It allows unauthenticated users to execute arbitrary code remotely via the public interface. The vulnerability has been patched in versions 4.3.2, 4.2.16, and 4.1.18.

tags | exploit, remote, arbitrary, php, code execution, file upload
advisories | CVE-2024-8517
SHA-256 | 470929e92864600915a7773675e61c23486f09b86f3d05d72951628b436ed7c0
Nipah Virus Testing Management System 1.0 PHP Code Injection
Posted Sep 12, 2024
Authored by indoushka

Nipah Virus Testing Management System version 1.0 suffers from a php code injection vulnerability.

tags | exploit, php, virus
SHA-256 | 1d5d8ecfee17bb9d29a68547de9e3007c6fb30acdff37b24dca3f23a371620dd
Emergency Ambulance Hiring Portal 1.0 PHP Code Injection
Posted Sep 12, 2024
Authored by indoushka

Emergency Ambulance Hiring Portal version 1.0 suffers from a php code injection vulnerability.

tags | exploit, php
SHA-256 | a9602dbf2dcb3e61aff1d2d0fb60dd2cce4318e79d2ebd423c56f43a95c5c275
COVID19 Testing Management System 1.0 PHP Code Injection
Posted Sep 12, 2024
Authored by indoushka

COVID19 Testing Management System version 1.0 suffers from a php code injection vulnerability.

tags | exploit, php
SHA-256 | 81883da23094b5c57395049ea06aa7068f785e862d3a4b82429dae396025a5e9
BP Monitoring Management System 1.0 PHP Code Injection
Posted Sep 12, 2024
Authored by indoushka

BP Monitoring Management System version 1.0 suffers from a php code injection vulnerability.

tags | exploit, php
SHA-256 | 7d0200096ccae9af066f1ebc1535a7bf1f3ece0cde52cfc5f532d21d370bd831
Art Gallery Management System 1.0 PHP Code Injection
Posted Sep 12, 2024
Authored by indoushka

Art Gallery Management System version 1.0 suffers from a php code injection vulnerability.

tags | exploit, php
SHA-256 | b19faa3bd593c77aadffed902c2a89af0262656a3ea584a12c74dc6dc625dca5
Ubuntu Security Notice USN-6841-2
Posted Sep 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6841-2 - USN-6841-1 fixed a vulnerability in PHP. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information.

tags | advisory, php
systems | linux, ubuntu
advisories | CVE-2024-5458
SHA-256 | d170b8e7f8f92515ffeb2d3bd1921abc8a3d13ffd05345330e4edb30169de83a
VICIdial Multiple Authenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die | Site metasploit.com

This Metasploit module exploits several authenticated SQL Inject vulnerabilities in VICIdial 2.14b0.5 prior to svn/trunk revision 3555 (VICIBox 10.0.0, prior to January 20 is vulnerable). Injection point 1 is on vicidial/admin.php when adding a user, in the modify_email_accounts parameter. Injection point 2 is on vicidial/admin.php when adding a user, in the access_recordings parameter. Injection point 3 is on vicidial/admin.php when adding a user, in the agentcall_email parameter. Injection point 4 is on vicidial/AST_agent_time_sheet.php when adding a user, in the agent parameter. Injection point 5 is on vicidial/user_stats.php when adding a user, in the file_download parameter. VICIdial does not encrypt passwords by default.

tags | exploit, php, vulnerability
advisories | CVE-2022-34876, CVE-2022-34877, CVE-2022-34878
SHA-256 | ee13ad5d4ae7546320169435916f3c9bac21c75f6a3c00a761a80c9d13b3d3b5
Icingaweb Directory Traversal In Static Library File Requests
Posted Sep 1, 2024
Authored by h00die, Thomas Chauchefoin, Jacob Ebben | Site metasploit.com

Icingaweb versions from 2.9.0 to 2.9.5 inclusive, and 2.8.0 to 2.8.5 inclusive suffer from an unauthenticated directory traversal vulnerability. The vulnerability is triggered through the icinga-php-thirdparty library, which allows unauthenticated users to retrieve arbitrary files from the targets filesystem via a GET request to /lib/icinga/icinga-php-thirdparty/<absolute path to target file on disk> as the user running the Icingaweb server, which will typically be the www-data user. This can then be used to retrieve sensitive configuration information from the target such as the configuration of various services, which may reveal sensitive login or configuration information, the /etc/passwd file to get a list of valid usernames for password guessing attacks, or other sensitive files which may exist as part of additional functionality available on the target server. This Metasploit module was tested against Icingaweb 2.9.5 running on Docker.

tags | exploit, arbitrary, php
advisories | CVE-2022-24716
SHA-256 | cdc69a4bccff0e05ac6725d9eb18225432bfef742c18d90b549db0f05b86206e
Bitweaver Overlay_type Directory Traversal
Posted Sep 1, 2024
Authored by sinn3r, Jonathan Claudius, David Aaron | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability found in Bitweaver. When handling the overlay_type parameter, view_overlay.php fails to do any path checking/filtering, which can be abused to read any file outside the virtual directory.

tags | exploit, php
advisories | CVE-2012-5192
SHA-256 | 75260c8739219589832630db597ad076c6fa9dee26583aeb19f2537f54e959f0
WordPress WPS Hide Login Login Page Revealer
Posted Sep 1, 2024
Authored by h00die, thalakus | Site metasploit.com

This Metasploit module exploits a bypass issue with WPS Hide Login versions less than or equal to 1.9. WPS Hide Login is used to make a new secret path to the login page, however a GET request to /wp-admin/options.php with a referer will reveal the hidden path.

tags | exploit, php
advisories | CVE-2021-24917
SHA-256 | cf0e23084f88d35da4dd2286627bbd0801ca437e1cdded439cd94d23e28d6ab9
Chinese Caidao Backdoor Bruteforce
Posted Sep 1, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module attempts to bruteforce the chinese caidao asp/php/aspx backdoor.

tags | exploit, php, asp
SHA-256 | 60088f8d003987fa40a7002f9f668383b9ab73531f528efc470f1246253bee90
WordPress ChopSlider3 Id SQL Injection Scanner
Posted Sep 1, 2024
Authored by h00die, SunCSR, Callum Murphy | Site metasploit.com

The iDangero.us Chop Slider 3 WordPress plugin version 3.4 and prior contains a blind SQL injection in the id parameter of the get_script/index.php page. The injection is passed through GET parameters, and thus must be encoded, and magic_quotes is applied at the server.

tags | exploit, php, sql injection
advisories | CVE-2020-11530
SHA-256 | c40d3f2150f043263d7f5b593f87cd6eb6ed9507f109b3c2713e5d016de691c2
Wordpress LearnPress Current_items Authenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die, nhattruong, Sagi Tzadik, Omri Herscovici | Site metasploit.com

LearnPress, a learning management plugin for WordPress, prior to 3.2.6.8 is affected by an authenticated SQL injection via the current_items parameter of the post-new.php page.

tags | exploit, php, sql injection
advisories | CVE-2020-6010
SHA-256 | 150d41dad29f88db33ed82424ed85cc194746e3e92127751db33050409ecec61
WebPageTest Directory Traversal
Posted Sep 1, 2024
Authored by dun, sinn3r | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability found in WebPageTest. Due to the way the gettext.php script handles the file parameter, it is possible to read a file outside the www directory.

tags | exploit, php
SHA-256 | c8fc5793bb9641b12b4d2106a06fb4d479a668d64206809ae721e664f0532142
WordPress Total Upkeep Unauthenticated Backup Downloader
Posted Sep 1, 2024
Authored by h00die, Wadeek | Site metasploit.com

This Metasploit module exploits an unauthenticated database backup vulnerability in WordPress plugin Boldgrid-Backup also known as Total Upkeep version < 1.14.10. First, env-info.php is read to get server information. Next, restore-info.json is read to retrieve the last backup file. That backup is then downloaded, and any sql files will be parsed looking for the wp_users INSERT statement to grab user creds.

tags | exploit, php
SHA-256 | 8ab619abe5830fc334f96aa44ebe91bf5262fbdf2d37942eb3a12c5a678f4e61
TYPO3 News Module SQL Injection
Posted Aug 31, 2024
Authored by Charles FOL, Marco Rivoli | Site metasploit.com

This Metasploit module exploits a SQL Injection vulnerability In TYPO3 NewsController.php in the news module 5.3.2 and earlier. It allows an unauthenticated user to execute arbitrary SQL commands via vectors involving overwriteDemand and OrderByAllowed. The SQL injection can be used to obtain password hashes for application user accounts. This Metasploit module has been tested on TYPO3 3.16.0 running news extension 5.0.0. This Metasploit module tries to extract username and password hash of the administrator user. It tries to inject sql and check every letter of a pattern, to see if it belongs to the username or password it tries to alter the ordering of results. If the letter doesnt belong to the word being extracted then all results are inverted (News #2 appears before News #1, so Pattern2 before Pattern1), instead if the letter belongs to the word being extracted then the results are in proper order (News #1 appears before News #2, so Pattern1 before Pattern2).

tags | exploit, arbitrary, php, sql injection
advisories | CVE-2017-7581
SHA-256 | 472f7767d1d622fc181d7fa0a90d223e85f29ef884a67376c132a17b0cf4808e
WordPress WPLMS Theme Privilege Escalation
Posted Aug 31, 2024
Authored by Evex, rastating | Site metasploit.com

The WordPress WPLMS theme from version 1.5.2 to 1.8.4.1 allows an authenticated user of any user level to set any system option due to a lack of validation in the import_data function of /includes/func.php. The module first changes the admin e-mail address to prevent any notifications being sent to the actual administrator during the attack, re-enables user registration in case it has been disabled and sets the default role to be administrator. This will allow for the user to create a new account with admin privileges via the default registration page found at /wp-login.php?action=register.

tags | exploit, php
SHA-256 | 3114c995b0c2306901d1283939e44b371d069e27d3e312a12481be6528b00537
WordPress Symposium Plugin SQL Injection
Posted Aug 31, 2024
Authored by Matteo Cantoni, PizzaHatHacker | Site metasploit.com

This Metasploit module exploits a SQL injection vulnerability in the WP Symposium plugin before 15.8 for WordPress, which allows remote attackers to extract credentials via the size parameter to get_album_item.php.

tags | exploit, remote, php, sql injection
advisories | CVE-2015-6522
SHA-256 | 2961b2a6386f280ff2a5c8a22286ae6b39869c94cfc164ff4f01d0e67ea4a838
VBulletin Administrator Account Creation
Posted Aug 31, 2024
Authored by juan vazquez, temp66 | Site metasploit.com

This Metasploit module abuses the "install/upgrade.php" component on vBulletin 4.1+ and 4.5+ to create a new administrator account, as exploited in the wild on October 2013. This Metasploit module has been tested successfully on vBulletin 4.1.5 and 4.1.0.

tags | exploit, php
advisories | CVE-2013-6129
SHA-256 | c24deea47d1ee74b3fe339182867838b53b59f6e667d57d1dedb6d10ded9c962
D-Link DIR-600 / DIR-300 Unauthenticated Remote Command Execution
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits an OS Command Injection vulnerability in some D-Link Routers like the DIR-600 rev B and the DIR-300 rev B. The vulnerability exists in command.php, which is accessible without authentication. This Metasploit module has been tested with the versions DIR-600 2.14b01 and below, DIR-300 rev B 2.13 and below. In order to get a remote shell the telnetd could be started without any authentication.

tags | exploit, remote, shell, php
SHA-256 | 2f5b594e622d424820044978baa8b49d0949391ea6ea0829281922f271fa3004
WordPress WP GDPR Compliance Plugin Privilege Escalation
Posted Aug 31, 2024
Authored by Mikey Veenstra, Thomas Labadie | Site metasploit.com

The Wordpress GDPR Compliance plugin less than or equal to v1.4.2 allows unauthenticated users to set wordpress administration options by overwriting values within the database. The vulnerability is present in WordPress’s admin-ajax.php, which allows unauthorized users to trigger handlers and make configuration changes because of a failure to do capability checks when executing the save_setting internal action. WARNING: The module sets Wordpress configuration options without reading their current values and restoring them later.

tags | exploit, php
advisories | CVE-2018-19207
SHA-256 | 64cded384a3949ad5bd9c2b263dc7ba25d3c4c97c531268cfc49e7c119da1511
WordPress WP EasyCart Plugin Privilege Escalation
Posted Aug 31, 2024
Authored by rastating | Site metasploit.com

The WordPress WP EasyCart plugin from version 1.1.30 to 3.0.20 allows authenticated users of any user level to set any system option via a lack of validation in the ec_ajax_update_option and ec_ajax_clear_all_taxrates functions located in /inc/admin/admin_ajax_functions.php. The module first changes the admin e-mail address to prevent any notifications being sent to the actual administrator during the attack, re-enables user registration in case it has been disabled and sets the default role to be administrator. This will allow for the user to create a new account with admin privileges via the default registration page found at /wp-login.php?action=register.

tags | exploit, php
advisories | CVE-2015-2673
SHA-256 | 82a443a84115c1e1dd2260df74ac66dd23800ff63bb525cbf98d193ffcf673c2
Page 4 of 214
Back23456Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close