Jump to content

JacekN

New Members
  • Posts

    4
  • Joined

  • Last visited

JacekN's Achievements

Newbie

Newbie (1/5)

0

Reputation

  1. Thanks, Kicken. Nothing better than a framework that opens up holes.
  2. Thanks, Max. What about this one? uri=/index.php?s=/Index/\x5Cthink\x5Capp/invokefunction&function=call_user_func_array&vars[0]=sha1&vars[1][]=xyzt
  3. But what kind of vulnerability? I run my own php script, so I'm not concerned about exposure. I just want to know what they're after. It this a WordPress exploit or something like that?
  4. When someone sends this to your index.php, what are they trying to do? /index.php?s=/module/action/param1/${@die(sha1(xyzt))}
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.