text stringlengths 0 1.99k |
|---|
ERROR: type should be string, got " https://bugs.php.net/bug.php?id=71105" |
[19] Alexander "alech" Klink, Julian "zeri" Wälde, "Efficient Denial of |
Service Attacks on Web Application Platforms", |
ERROR: type should be string, got " https://fahrplan.events.ccc.de/congress/2011/Fahrplan/attachments/" |
2007_28C3_Effective_DoS_on_web_application_platforms.pdf |
[20] Philippe "pilvar" Dourassov, "Secret Web Hacking Knowledge - CTF |
authors hate these simple tricks", https://download.scrt.ch/ |
insomnihack/ins24-slides/Secret_web_hacking_knowledge.pdf?page=144 |
[21] Dustin Schultz, "Critical PHP Remote Vulnerability Introduced in Fix |
for PHP Hashtable Collision DOS", http://thexploit.com/sec/critical- |
php-remote-vulnerability-introduced-in-fix-for-php-hashtable- |
collision-dos/ (archived) |
[22] Simon Scannell, "WordPress < 5.8.3 - Object Injection Vulnerability" |
ERROR: type should be string, got " https://www.sonarsource.com/blog/wordpress-object-injection-" |
vulnerability/ |
[23] Stefan Esser, "MySQL and SQL Column Truncation Vulnerabilities" |
http://www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation- |
vulnerabilities/ (archived) |
[24] Tom Van Goethem, "WordPress < 3.6.1 PHP Object Injection" |
ERROR: type should be string, got " https://tom.vg/2013/09/wordpress-php-object-injection/" |
[25] "0CTF 2016 Quals / piapiapia", https://ctftime.org/task/2130 |
[26] Alessandro "kiks" Groppo, "Rusty Joomla Remote Code Execution" |
ERROR: type should be string, got " https://1day.dev/notes/Rusty-Joomla-Remote-Code-Execution/" |
[27] Slavco Mihajloski, "Wordpress SQLi" |
ERROR: type should be string, got " https://medium.com/websec/wordpress-sqli-bbb2afcc8e94 (archived)" |
[28] Karim El Ouerghemmi, Slavco Mihajloski |
"Privilege Escalation in 2.3M WooCommerce Shops" |
ERROR: type should be string, got " https://blog.ripstech.com/2018/woocommerce-php-object-" |
injection/ (archived) |
[29] Taoguang "Ryat" Chen, "Create an Unexpected Object and Don't Invoke |
__wakeup() in Deserialization", https://bugs.php.net/bug.php?id=72663 |
[30] Paul Axe, "WCTF 2019 / P Door" |
ERROR: type should be string, got " https://github.com/paul-axe/ctf/blob/master/wctf2019/p-door/p-door.pdf" |
[31] inhann, "A new way to bypass __wakeup() and build POP chain" |
ERROR: type should be string, got " https://inhann.top/2022/05/17/bypass_wakeup/" |
[32] "PHPGGC", https://github.com/ambionics/phpggc |
[33] Arseniy "Raz0r" Reutov, "CONFidence 2013: PHP Object Injection |
Revisited", https://raz0r.name/talks/confidence-2013-php- |
object-injection-revisited/ |
[34] Dario "haxonaut" Weißer, cutz, Ruslan "evonide" Habalov |
"How we broke PHP, hacked Pornhub and earned $20,000" |
ERROR: type should be string, got " https://www.evonide.com/how-we-broke-php-hacked-pornhub-" |
and-earned-20000-dollar/ |
[35] Stefan Esser, "State of the Art Post Exploitation in Hardened PHP |
Environments", https://www.blackhat.com/presentations/bh-usa-09/ESSER/ |
BHUSA09-Esser-PostExploitationPHP-SLIDES.pdf |
[36] Taoguang "Ryat" Chen, "Use after free vulnerability in unserialize() |
with DateTimeZone", https://bugs.php.net/bug.php?id=68942 |
[37] Orange Tsai, "A Journey Combining Web Hacking and Binary Exploitation |
in Real World!", https://blog.orange.tw/posts/2021-02- |
a-journey-combining-web-and-binary-exploitation/ |
[38] "HTTPoxy", https://httpoxy.org/ |
[39] Joshua Maddux, "TLS Poison", https://github.com/jmdx/TLS-poison/ |
[40] Charles "cfreal" Fol, "Laravel <= v8.4.2 debug mode: Remote code |
execution", https://blog.lexfo.fr/laravel-debug-rce.html |
[41] Giovanni "evilaliv3" Pellerano, Antonio "s4tan" Parata, Francesco |
"ascii" Ongaro, Alessandro "jekil" Tanasi, "PHP filesystem attack |
vectors - Take Two" |
ERROR: type should be string, got " https://www.ush.it/2009/07/26/php-filesystem-attack-vectors-take-two/" |
[42] Vladimir Vorontsov, Arthur Gerkis, "Oddities of PHP file access in |
Windows", http://onsec.ru/onsec.whitepaper-02.eng.pdf (archived) |
[43] "PHPCMSv9逻辑漏洞导致备份文件名可猜测" |
ERROR: type should be string, got " https://mp.weixin.qq.com/s?__biz=MzIxNjkwODg4OQ==&mid=2247483837&" |
idx=1&sn=6f448a26d079bfa379c627e32f4fc321 |
[44] "解决DEDECMS历史难题--找后台目录", https://xz.aliyun.com/news/1765 |
[45] Soroush "irsdl" Dalili |
"A Dotty Salty Directory: A Secret Place in NTFS for Secret Files!" |
ERROR: type should be string, got " https://soroush.me/blog/2010/12/a-dotty-salty-directory-a-secret-" |
place-in-ntfs-for-secret-files/ |
[46] Orange Tsai, Splitline NG |
"WorstFit: Unveiling Hidden Transformers in Windows ANSI!" |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.