About 12,000,000 results
Open links in new tab
  1. PHP Code Injection: Examples and 4 Prevention Tips

    Jun 6, 2022 · Depending on the language, it usually involves using a function like eval(). Additionally, a direct concatenation of user-supplied strings constitutes unsafe processing. …

  2. Top 10 exploits in PHP applications and how to exploit them

    Dec 15, 2023 · Explore the top 10 security exploits in PHP applications, including SQL Injection, XSS, RFI, and LFI, with in-depth analysis and mitigation strategies to enhance your PHP …

  3. Exploiting insecure deserialization vulnerabilities

    However, in PHP it is sometimes possible to exploit deserialization even if there is no obvious use of the unserialize() method. PHP provides several URL-style wrappers that you can use for …

  4. Exploiting PHP Deserialization - Vickie Li’s Security Blog

    Aug 31, 2020 · To exploit this RCE, you simply have to set your data cookie to a serialized Example2 object with the hook property set to whatever PHP code you want. You can …

  5. What is PHP Injection | Types, Examples & Prevention | Imperva

    Apr 16, 2025 · PHP injections are often carried out by exploiting the PHP eval function. This function executes strings as PHP code, and is commonly used for debugging. If the eval …

  6. PHP Object Injection - OWASP Foundation

    Since PHP allows object serialization, attackers could pass ad-hoc serialized strings to a vulnerable unserialize() call, resulting in an arbitrary PHP object(s) injection into the application …

  7. php - XSS attack to bypass htmlspecialchars() function in value ...

    Jun 25, 2010 · We can use String.fromCode (.....) to get around the quotes, but I still unable to get a simple alert box to pop up. Any ideas?

  8. Exploit PHP Remotely - WAF Rule & Filter Bypass - Secjuice

    Dec 24, 2018 · How To Exploit PHP Remotely To Bypass Filters & WAF Rules. Learn about the possibilities that PHP gives us to exploit and execute code remotely in order to bypass filters, …

  9. How to bypass PHP strings == comparison for sha256 string?

    May 12, 2016 · It's simple like this: if($_POST['username'] AND $_POST['password']){ // Check username/password with above code. } else if($_POST['username']){ $content .= alert("Please …

  10. Abusing PHP query string parser to bypass IDS, IPS, and WAF

    Jul 7, 2019 · In this post, we'll see how the PHP query string parser could lead to many IDS/IPS and Application Firewall rules bypass. TL;DR: As you know, PHP converts query string (in the …

Refresh