Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/TobinShields/qdPM9.1_Exploit
This is an exploit to automatically upload a PHP web shell to the qdPM 9.1 platform via the "upload a profile photo" feature. This method also bypasses the fix put into place from a previous CVE
https://github.com/TobinShields/qdPM9.1_Exploit
Last synced: about 23 hours ago
JSON representation
This is an exploit to automatically upload a PHP web shell to the qdPM 9.1 platform via the "upload a profile photo" feature. This method also bypasses the fix put into place from a previous CVE
- Host: GitHub
- URL: https://github.com/TobinShields/qdPM9.1_Exploit
- Owner: TobinShields
- License: mit
- Created: 2020-02-25T09:49:19.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2020-02-28T07:16:46.000Z (almost 5 years ago)
- Last Synced: 2023-03-01T15:46:50.366Z (almost 2 years ago)
- Language: Python
- Size: 8.4 MB
- Stars: 3
- Watchers: 1
- Forks: 3
- Open Issues: 0
Awesome Lists containing this project
- awesome-security-vul-llm - TobinShields/qdPM9.1_Exploit - square) - 利用漏洞CVE-2020-7246,通过上传带有恶意代码文件的用户照片来执行远程代码执行(RCE)。 (LLM分析过程)