mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
35 lines
1.4 KiB
Markdown
35 lines
1.4 KiB
Markdown
![]() |
### [CVE-2015-2208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2208)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The saveObject function in moadmin.php in phpMoAdmin 1.1.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the object parameter.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/130685/PHPMoAdmin-1.1.2-Remote-Code-Execution.html
|
||
|
- http://seclists.org/fulldisclosure/2015/Mar/19
|
||
|
- http://www.exploit-db.com/exploits/36251
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0x43f/Exploits
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/AndreaOm/awesome-stars
|
||
|
- https://github.com/Lawrence-Dean/awesome-stars
|
||
|
- https://github.com/NCSU-DANCE-Research-Group/CDL
|
||
|
- https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s
|
||
|
- https://github.com/WangYihang/Exploit-Framework
|
||
|
- https://github.com/Xcod3bughunt3r/ExploitsTools
|
||
|
- https://github.com/XiphosResearch/exploits
|
||
|
- https://github.com/dr4v/exploits
|
||
|
- https://github.com/jmedeng/suriya73-exploits
|
||
|
- https://github.com/pekita1/awesome-stars
|
||
|
- https://github.com/ptantiku/cve-2015-2208
|
||
|
- https://github.com/sepehrdaddev/blackbox
|
||
|
- https://github.com/shildenbrand/Exploits
|
||
|
- https://github.com/svuz/blackbox
|
||
|
|