### [CVE-2016-5734](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5734) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation. ### POC #### Reference - https://www.exploit-db.com/exploits/40185/ #### Github - https://github.com/15866095848/15866095848 - https://github.com/2dukes/PROJ_FSI_2122 - https://github.com/ARPSyndicate/cvemon - https://github.com/HKirito/phpmyadmin4.4_cve-2016-5734 - https://github.com/KosukeShimofuji/CVE-2016-5734 - https://github.com/KosukeShimofuji/cve-report-template - https://github.com/KosukeShimofuji/cve_watch - https://github.com/Micr067/Pentest_Note - https://github.com/SexyBeast233/SecBooks - https://github.com/Ygodsec/- - https://github.com/atdpa4sw0rd/Experience-library - https://github.com/czq945659538/-study - https://github.com/duckstroms/Web-CTF-Cheatsheet - https://github.com/heane404/CVE_scan - https://github.com/lnick2023/nicenice - https://github.com/miko550/CVE-2016-5734-docker - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/sv3nbeast/Attack-Notes - https://github.com/w181496/Web-CTF-Cheatsheet - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xiaoy-sec/Pentest_Note - https://github.com/zhang040723/web