mirror of
https://github.com/0xMarcio/cve.git
synced 2026-03-28 10:10:54 +01:00
1.9 KiB
1.9 KiB
CVE-2016-5734
Description
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
POC
Reference
Github
- https://github.com/15866095848/15866095848
- https://github.com/2dukes/PROJ_FSI_2122
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HKirito/phpmyadmin4.4_cve-2016-5734
- https://github.com/KosukeShimofuji/CVE-2016-5734
- https://github.com/KosukeShimofuji/cve-report-template
- https://github.com/KosukeShimofuji/cve_watch
- https://github.com/Micr067/Pentest_Note
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Ygodsec/-
- https://github.com/atdpa4sw0rd/Experience-library
- https://github.com/czq945659538/-study
- https://github.com/duckstroms/Web-CTF-Cheatsheet
- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks
- https://github.com/heane404/CVE_scan
- https://github.com/lnick2023/nicenice
- https://github.com/miko550/CVE-2016-5734-docker
- https://github.com/mrhenrike/Hacking-Cheatsheet
- https://github.com/pwnosec/CTF-Cheatsheet
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/sv3nbeast/Attack-Notes
- https://github.com/w181496/Web-CTF-Cheatsheet
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xiaoy-sec/Pentest_Note
- https://github.com/zhang040723/web